Ruji P Medina
Technological Institute of the Philippines

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

Securing Electronic Medical Records Using Modified Blowfish Algorithm Theda Flare Ginoy Quilala; Ariel M Sison; Ruji P Medina
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 6, No 3: September 2018
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v6i3.493

Abstract

EMR helped improve services to patients by delivering organization and accuracy of patient information, but issues regarding security breaches and medical identity theft are growing concerns. This paper enhance the current EMR system by integrating modified encryption. The simulation used modified Blowfish algorithm in an EMR system that focuses on four goals: 1) define the requirements, 2) design and identify features, 3) develop the EMR incorporating added security mechanism using modified Blowfish algorithm, and 4) test the application with sample data. Based on the results, the incorporation of the encryption was successful based on testing and checking done on the input terminal and the database server. Data inputted on the EMR system was successfully encrypted before transmission and decrypted only on the terminal for viewing. Performance results show that without encryption, saving took an average of 87.8ms while encrypted, it acquired 88.8ms, a difference of 1ms can be noted. The minimal difference is because of the size of the data. The average decryption time of all records using modified algorithm took 1342ms while using plaintext took 1322ms. The decryption time is higher by 20ms due to the application of the decryption algorithm.
QR Code Integrity Verification Based on Modified SHA-1 Algorithm Rogel Ladia Quilala; Ariel M Sison; Ruji P Medina
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 6, No 4: December 2018
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v6i4.494

Abstract

The modified SHA-1 algorithm was applied in the data integrity verification process of certificates with QR code technology. This paper identified the requirements needed in the certificate verification that uses the modified SHA-1. The application was tested using legitimate and fraudulent certificates. Based on the results, the application successfully generated QR codes, printed certificates, and verified certificates with 100% accuracy. During the trial run of the app, four test cases were seen which involves correct names and QR codes, and three other possible test cases of faking certificates such as modification of the name, regeneration of QR codes using valid hash and a fake name, and modification of the QR code. Although these cases exist, the app successfully verified all thirty certificates correctly. Also, it is noticed that during the scanning, the smartphone camera should be in focus to capture the QR code clearly.
Modified SHA-1 Algorithm Rogel Ladia Quilala; Ariel M Sison; Ruji P Medina
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i3.pp1027-1034

Abstract

Hashes are used to check the integrity of data. This paper modified SHA-1 by incorporating mixing method in every round for better diffusion. The modification increased the hash output to 192-bits. Increasing the output increases the strength because breaking the hash takes longer. Based on the different message types, avalanche percentage of modified SHA-1 showed better diffusion at 51.64%, higher than the target 50%, while SHA-1 achieved 46.61%. The average execution time noted for modified SHA-1 is 0.33 seconds while SHA-1 is 0.08 seconds. Time increases as the number of messages hashed increases; the difference is negligible in fewer messages. On character hits, that is - no same character in the same position, modified SHA-1 achieved lower hit rate because of the mixing method added. The modifications’ effectiveness was also evaluated using a hash test program. After inputting 1000 hashes from random strings, the result shows no duplicate hash.
Improving self-organizing map with nguyen-widrow initialization lgorithm Maureen Nettie N Linan; Bobby D Gerardo; Ruji P Medina
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 1: July 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v15.i1.pp535-542

Abstract

The quality of cluster result and the learning speed of Self-organizing map (SOM) are dependent on the initialization of weights since the initial values for weight vectors affect the performance of SOM training when applied to clustering. In this paper, improvement of SOM was achieved with the application of the Nguyen-Widrow algorithm to initialize weights. Nguyen-Widrow initialization algorithm is a method for initialization of the weights of neural networks to speed up the training process. Performance of the modified SOM was determined in terms of cluster error rate and the number of iterations to achieve convergence using different datasets and results show that the modified SOM algorithm produces better cluster results and improved training speed compared to traditional SOM.
Modified Blowfish Algorithm Theda Flare Ginoy Quilala; Ariel M Sison; Ruji P Medina
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i1.pp38-45

Abstract

Cryptography guarantees security in communication through encryption. This paper proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to comply with minimum requirements as an encryption standard. The modification retained the original structure for easy migration but utilized two S-boxes to save memory. A derivation was added to prevent symmetry.  The algorithm’s performance was evaluated using time, and avalanche. Upon testing, the modified blowfish is slower with key, encryption, and decryption average of 26.99ms, 1651.83ms, and 2765.04ms compared to blowfish with 21.65ms, 1297.76ms and 2176.59ms due to block size difference. Applying 128-bit block size increases security by decreasing the chances of having duplicate blocks that may leak information. The modified Blowfish is faster compared to Twofish with an encryption and decryption average time of 2418.08ms and 4002.70ms. The added derivation improved the avalanche of the modified blowfish.  Blowfish achieved 47.14% while modified Blowfish attained 52.86%.