Results (94)
Search Parameters:
Keyword: PTOAutomated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC
Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…
Read MoreComparative Study of J48 Decision Tree and CART Algorithm for Liver Cancer Symptom Analysis Using Data from Carnegie Mellon University
Liver cancer is a major contributor to cancer-related mortality both in the United States and worldwide. A range of liver diseases, such as chronic liver disease, liver cirrhosis, hepatitis, and liver cancer, play a role in this statistic. Hepatitis, in particular, is the main culprit behind liver cancer. As a consequence, it is decisive to…
Read MoreExtraction of Psychological Symptoms and Instantaneous Respiratory Frequency as Indicators of Internet Addiction Using Rule-Based Machine Learning
Internet addiction (IA) has adverse effects on psychophysiological responses, interpersonal relationships, and academic and occupational performance. IA detection has received increasing attention. Although questionnaires enable long-term assessment (over 6 months) and physiological measurements to aid the short-term evaluation (over 2 min) of IA, the lack of algorithms results in an inability to detect IA in…
Read MoreQuantum Secure Lightweight Cryptography with Quantum Permutation Pad
Quantum logic gates represent certain quantum operations to perform quantum computations. Of those quantum gates, there is a category of classical behavior gates called quantum permutation gates. As a quantum algorithm, quantum permutation pad or QPP consists of multiple quantum permutation gates to be implemented both in a quantum computing system as a quantum circuit…
Read MoreMobile Money Wallet Attack Resistance using ID-based Signcryption Cryptosystem with Equality Test
This paper is an extension of a research work presented at ICSIoT 2019. An attack continuum against the insider attack in mobile money security in Ghana using a witness based crypto- graphic method proposed by Alornyo et al. resisted the service provider from peddling with users data for economic gains. Our improved scheme achieves a…
Read MoreA Novel Approach to Augment the Opto-Electronic Properties of Stannic Oxide (SnO2) Thin Films by Vanadium Doping
The Tin Oxide: Vanadium (SnO2: V) thin films have been deposited on glass substrates with various Vanadium concentration at a substrate temperature;500oC using microprocessor-controlled spray pyrolysis technique. The structural, compositional, morphological and optical analyses of the samples are characterized by XRD, EDAX, SEM and UV-Visible spectroscopy. The XRD analysis shows tetragonal rutile structure formation in…
Read MoreComparative Study of Cryptocurrency Algorithms: Coronavirus Towards Bitcoin’s Expansion
The widespread presence of Coronavirus (COVID-19) is causing organizations and individuals major economics downsizing. The way this virus is transmitted from one individual to another is the real cause of the problem. For that, researchers in different fields started seriously looking for touch-less and contact-less exchange. Particularly in the finance world, cash transactions and keypad…
Read MoreNew Algorithm for the Development of a Musical Words Descriptor for the Artificial Composition of Oriental Music
The Music Composition Library of the great composers constitutes an intellectual heritage. This article introduces an algorithm of artificial Oriental composing music based on the descriptors determined on a large learning base to automatically write Oriental music as the logic identical to any composer. Musical words are called a grammatical alphabet. Each word derived is…
Read MoreMultiscale Texture Analysis and Color Coherence Vector Based Feature Descriptor for Multispectral Image Retrieval
Content Based Image Retrieval (CBIR) for remote sensing image data is a tedious process due to high resolution and complexity of image interpretation. Development of feature extraction technique is a major portion to represent the image content in an optimal way. In this paper, we propose a feature descriptor which combines the color coherent pixel…
Read MoreMulti-Step Iteration Algorithm of Total Asymptotically Quasi-Nonexpansive Maps
In Banach spaces an iteration algorithm for two finite families of total asymptotically quasi-nonexpansive maps is introduced. Weak and strong convergence theorems of this algorithm to approximation common fixed points are proved by using suitable conditions. As well as, numerical example by using Mat-lab is given.
Read MoreMorphological and Optoelectrical Characterization of Silicon Nanostructures for Photovoltaic Applications
Metal (silver)-Assisted Chemical Etching (MACE) method is used to fabricate silicon nanostructures like silicon nanowires (SiNWs) and silicon nanocones (SiNCs). The morphological characterization of fabricated SiNWs has shown that 5 minutes is the optimal time of silver deposition on silicon substrate. Silicon nanocones (SiNCs) were also fabricated by etching vertical SiNWs with a AgNO3=HF=H2O2 solution.…
Read MoreModified HOG Descriptor-Based Banknote Recognition System
This survey paper deals with the structural health monitoring systems on the basis of methodologies involving intelligent techniques. The intelligent techniques are the most popular tools for damage identification in terms of high accuracy, reliable nature and the involvement of low cost. In this critical survey, a thorough analysis of various intelligent techniques is carried…
Read MoreEffect of Risperidone with Ondansetron to Control the Negative and Depressive Symptoms in Schizophrenia
To evaluate the effects of Ondansetron on the negative and depressive symptoms of patients with schizophrenia. A double-blind randomized control trial was conducted in 2016-17 in Lahore. 30 participants were included both in placebo and medicine group. The patients were assessed by using the Positive and Negative Syndrome Scale (PANSS) and Hamilton’s Rating Scale for…
Read MoreSteganography System with Application to Crypto-Currency Cold Storage and Secure Transfer
In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image…
Read MoreS-asymptotically w-periodic solutions in the p-th mean for a Stochastic Evolution Equation driven by Q-Brownian motion
In this paper, we study the existence (uniqueness) and asymptotic stability of the p-th mean S-asymptotically !-periodic solutions for some nonautonomous Stochastic Evolution Equations driven by a Q-Brownian motion. This is done using the Banach fixed point Theorem and a Gronwall inequality.
Read MoreCognitive Cybernetics vs. Captology
In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…
Read MoreA Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT) and Key Coloumnar Transposition (KCT) Method
One Time Pad (OTP) is a cryptographic algorithm that is quite easy to be implemented. This algorithm works by converting plaintext and key into decimal then converting into binary number and calculating Exclusive-OR logic. In this paper, the authors try to make the comparison of OTP cryptography using KPI and KCT so that the ciphertext…
Read MoreModification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice
Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…
Read MoreThree-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…
Read MoreS-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency
Segmented and unsegmented 3D insulated copper through silicon vias (TSVs) of diameter 10 micro-meter, height 100 micro-meter and silicon of sizes 100 micro-meter by 100 micro-meter by 100 micro-meter are modeled using analysis system (ANSYS), equivalent circuit using advanced design system (ADS) at frequency ranges between 100MHz and 40GHz and 10MHz step size. The segmented…
Read MoreStrong Authentication Protocol based on Java Crypto Chip as a Secure Element
Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…
Read MoreHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreLeveraging Machine Learning for a Comprehensive Assessment of PFAS Nephrotoxicity
Polyfluoroalkyl substances (PFAS) are persistent chemicals that accumulate in the body and environment. Although recent studies have indicated that PFAS may disrupt kidney function, the underlying mechanisms and overall effects on the organ remain unclear. Therefore, this study aims to elucidate the impact of PFAS on kidney health using machine learning techniques. Utilizing a dataset…
Read MoreDouble-Enhanced Convolutional Neural Network for Multi-Stage Classification of Alzheimer’s Disease
Being known as an irreversible neurodegenerative disease which has no cure to date, detection and classification of Alzheimer’s disease (AD) in its early stages is significant so that the deterioration process can be slowed down. Generally, AD can be classified into three major stages, ranging from the “normal control” stage with no symptoms shown, the…
Read MoreForecasting Bitcoin Prices: An LSTM Deep-Learning Approach Using On-Chain Data
Over the past decade, Bitcoin’s unprecedented performance has underscored its po-sition as the premier asset class. Starting from an insignificant value and reaching an astounding high of around 65,000 U.S dollars in 2021 – all without a central con-trolling authority – Bitcoin’s trajectory is undoubtedly a historical feat. Its intangible nature, initially a subject of…
Read More
