ICT Analysis and Applications
In: Lecture Notes in Networks and Systems Ser. v.314
Intro -- Preface -- Contents -- Editors and Contributors -- Analysis of Codon Usage Bias in Cya, Lef, and Pag Genes Exists in px01 Plasmid of Bacillus Anthracis -- 1 Introduction -- 2 Materials and Methods -- 2.1 SequenceDataRetrieval -- 2.2 Phylogenetic Analysis -- 2.3 RelativeSynonymousCodonUsage (RSCU) Analysis -- 3 Results and Discussion -- 3.1 Phylogenetic Analysis -- 3.2 RSCU Pattern -- 4 Conclusion -- References -- Constructing Digital Signature Algorithm Based on a New Key Scheme -- 1 Introduction -- 2 Some Hard Problems Can Be Applied to Construct Secure Digital Signature Schemes -- 2.1 Discrete Logarithm Problem -- 2.2 Root Problem -- 2.3 An Expanded Form of Hard Problems -- 3 Building Digital Signature Algorithm Based on a New Key Scheme -- 3.1 Proposed Key Scheme -- 3.2 Constructing Digital Signature Algorithm Based on the Proposed Key Scheme -- 4 Safety-Level Assessment of the Proposed Algorithm Based on the Proposed Key Scheme -- 5 Conclusion -- References -- Internet of Things (IoT), Three-Layer Architecture, Security Issues and Counter Measures -- 1 Introduction -- 2 The IoT Architecture -- 2.1 Three-Layer Architectures -- 3 Security Issues of Three Layer Architecture -- 3.1 Threats and the Vulnerabilities of Perception Layer -- 3.2 Threats and the Vulnerabilities of Network Layer -- 3.3 Threats and the Vulnerabilities of Application Layer -- 4 Counter Measures -- 4.1 Authentication -- 4.2 Authorization and Access Control -- 4.3 Secure Architecture -- 4.4 Block Chain -- 4.5 Cryptographic Algorithm/Encryption -- 5 Conclusion -- References -- Intermittent Leather Defect Detection Based on Ensemble Algorithms Derived from Black Hat Transformation and Hough Transformation -- 1 Introduction -- 2 Literature Review -- 3 Details of Various Techniques -- 3.1 De-noising -- 3.2 Edge Detection Technique -- 3.3 Black Hat Transformation.