Volume 8, Issue 4, June 2017


A Secure Cryptographic Election Model

Ochieng’ Daniel Achola, Oleche Paul, Opiyo Richard and Oluoch Nyamwala

Department of Pure & Applied Mathematics, Maseno University, Kenya
School of Biological & Physical Sciences, Moi University, Kenya

Abstract– Political reform is needed to reverse the dwindling voter apathy which is a growing concern in many democracies. Simplification of election procedure through introduction of e-voting is one measure that can be undertaken even though it has considerable potential for large scale fraud due to automation and network connectivity. Employment of e-voting scheme to conduct large scale multi-hierarchical election in a secure way is feasible provided certain deficiencies of existing voting protocols are addressed. In this paper, we propose a hybrid cryptographic voting protocol with a stronger audit trail. We have used cryptographic techniques including homomorphic secret sharing for universal verifiability to publish results in bulletin boards, zero-knowledge proofs in proving correctness of permutations in mixnets and validated votes using blind signatures to encrypt incoercible protocols. We have also curbed coercibility through receipt-freeness in deniable encryptions with randomness jointly chosen by the voter and tamper resistant tokens.

Keywords— Voting Protocols, Zero Knowledge Proofs, Blind Signatures, Universal Verifiability and Homomorphic Secret Sharing

Download full paper PDF format (Page: 1-9)

Detecting Urdu Text Plagiarism Using Similarity Matching Techniques

Anam Lodhi, Saad Razzaq and Muqaddas Gull

Department of Computer Science, University of Sargodha, Pakistan

Abstract– Plagiarism Detection is emerging as an important part in various fields either it is educational sector or industrial. Stealing someone’s work or ideas is now more common than before. There have been developed many tools for plagiarism detection dealing directly with English language. Huge part of academic content is based on Urdu language, which serves as a means of communication in many countries. Detecting plagiarism is really a strenuous task accomplished in any language but it is even harder in Urdu language because of its complex structure. The sentence formation and lexicon structure of Urdu language are totally different from the structure of English and other European languages. We are evaluating text matching techniques to detect plagiarism in Urdu language.

Keywords— Urdu Language, Plagiarism, Pre-Processing Techniques, Detection System and Similarity

Download full paper PDF format (Page: 10-17)

Design and Simulation of Two Continues Wave AlGaAs/GaAs Semiconductor Cascade Quantum Well Lasers at Room Temperature

Banafshe Yaghtin, Rahim Ghayour and Mohammad Hossein Sheykhi

Department of Electronic and Communication Engineering, Shiraz University, Iran

Abstract– The objective of this research is to design and simulate two new structures of semiconductor quantum well cascade lasers. These structures are constructed of three quantum wells within their active regions, based on AlGaAs/GaAs materials. These structures are simulated in continuous wave (cw) mode and at room temperature. The first structure is a conventional type of cascade quantum well lasers and its output emitted power is 150 mW at the emission wavelength of 9.5 µm. In the second structure, the output power increased from 150 mW of the first structure to 210 mW at the same emission wavelength of 9.5 µm by three ways as follows: i) modifying the thicknesses of quantum wells and barriers, ii) varying mole fraction throughout the active regions, iii) reshaping the wells and conduction band in the active regions. The width, ridge cavity length and period numbers of both these lasers are 25um, 4 mm and 24 respectively. These two structures have a similar waveguide and cladding layers.

Keywords— Semiconductor Lasers, Quantum Wells and Quantum Cascade Lasers

Download full paper PDF format (Page: 18-22)

Secure Copyright Protection for Images Using Redundant DWT and SVD

Munazah Jamal, Saira Mudassar, Farkhand Shakeel, Nauman Shah, Hassaan Malik and Hamza Bin Tahir

NCBAE, Multan, Pakistan

Abstract– Digital Image Watermarking (DIW) is such a technique designed specifically for the protection of the images or data from illicit transformations. One of the best suited techniques for copyright protection and owner authentication is watermarking. In this document, a non-blind Digital Image Watermarking technique was proposed that is the fusion of two different techniques i.e., Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) in YCbCr color space. A reliable way of protection was introduced as it showed more resistance than that of different wavelet based techniques. The proposed scheme was tested against different geometrical transformations (median filtering, noise addition, cropping) and provided better extraction of the watermark. The performance increased the evaluation values of different parametric results i.e., Mean Square Error (MSE), Normalized Correlation (NC) and Peak Signal-to-noise Ratio (PSNR).

Keywords— Singular Value Decomposition, Redundant Discrete Wavelet Transform, Non-Blind Technique, YCbCr Color Space, and HH Sub-band

Download full paper PDF format (Page: 23-27)

Hybrid Tools and Techniques for Sentiment Analysis: A Review

Munir Ahmad, Shabib Aftab, Iftikhar Ali and Noureen Hameed

Department of Computer Science, Virtual University of Pakistan

Abstract– Sentiment analysis and opinion mining is closely coupled with each other. An extensive research work is being carried out in these areas by using different methodologies. Sentiments in a given text are identified by these methodologies as either positive, negative or neutral. Tweets, facebook posts, user comments about certain topics and reviews regarding product, software and movies can be the good source of information. Sentiment Analysis techniques can be used on such data by businesses executives for future planning and forecasting. As the data is obtained from multiple sources and it depends directly on the user which can be from any part of the world so the noisiness in data is a common issue such as mistake in spellings, grammatical errors and improper punctuation. Different approaches are available for sentiment analysis which can automatically sort and categorize the data. These approaches are mainly categorized as Machine Learning based, Lexicon based and Hybrid. A hybrid approach is the combination of machine learning and lexicon based approach for the optimum results, this approach generally yields better results. In this research work different hybrid techniques and tools have been discussed and analyzed from different aspects.

Keywords— Hybrid Technique for Sentiment Analysis, Opinion Mining, Polarity Detection and Social Media

Download full paper PDF format (Page: 28-33)