Volume 8 Number 3 September 2017

    
Ecological Security Evaluation for Coal Mining Areas based on Fuzzy c-means Algorithm - An Empirical Study of China Coal Mine Company

Xiaoling Ke, Amal Mougharbel

https://doi.org/

Abstract Using P-S-R Model as a framework, this paper selects fifteen typical indicators for evaluating coal mine ecological security, including employee number, raw coal production, industrial waste water discharge and so on, constructs an ecological security evaluation model for coal mining areas based on fuzzy c-means algorithm, collects data of ecological security in a coal mining company in Zhengzhou from 2007 to 2013, processes... Read More


Kronecker Product and Bat Algorithm Based Coefficient Generation for Privacy Protection on Cloud

Nandkishor Karlekar, Gomathi. N

https://doi.org/

Abstract Due to widespread growth of cloud technology, virtual server accomplished in cloud platform may collect useful data from a client and then jointly disclose the client’s sensitive data without permission. Hence, from the perspective of cloud clients, it is very important to take confident technical actions to defend their privacy at client side. Accordingly, different privacy protection techniques have been presented in the... Read More


Complex Encryption Methodology Based On Two Level Encryption Technique

Samir Kumar Bandyopadhyay

https://doi.org/

Abstract In this paper a complex encryption methodology has been employed to perform a high level data security. Here a two level encryption technique has been described. In first level a pattern matching array has been created in such a way such that all possible combination of any 4 bits sequences are present there. By using this pattern matching array the positional value of... Read More