The combination of steganography and
cryptography is considered as one of the best security methods
used for message protection, due to this reason, in this paper, a
data hiding system that is based on image steganography and
cryptography is proposed to secure data transfer between the
source and destination. Animated GIF image is chosen as a
carrier file format for the steganography due to a wide use in web
pages and a LSB (Least Significant Bits) algorithm is employed to
hide the message inside the colors of the pixels of an animated
GIF image frames. To increase the security of hiding, each frame
of GIF image is converted to 256 color BMP image and the
palette of them is sorted and reassign each pixels to its new index,
furthermore, the message is encrypted by LZW ( Lempel _
Ziv_Welch) compression algorithm before being hidden in the
image frames. The proposed system was evaluated for
effectiveness and the result shows that, the encryption and
decryption methods used for developing the system make the
security of the proposed system more efficient in securing data
from unauthorized users. The system is therefore, recommended
to be used by the Internet users for establishing a more secure
communication
Comparison of various data compression techniques and it perfectly differentiates different techniques of data compression. Its likely to be precise and focused on techniques rather than the topic itself.
Types of Data compression, Lossy Compression, Lossless compression and many more. How data is compressed etc. A little extensive than CIE O level Syllabus
Comparison of various data compression techniques and it perfectly differentiates different techniques of data compression. Its likely to be precise and focused on techniques rather than the topic itself.
Types of Data compression, Lossy Compression, Lossless compression and many more. How data is compressed etc. A little extensive than CIE O level Syllabus
Image compression: Techniques and ApplicationNidhi Baranwal
This presentation involves a mathematical view of image compression having a brief introduction of its theory,major techniques along with their algorithm and examples.
Data Compression, Lossy and Lossless Data Compression,Classification of Lossy and Lossless Data Compression, Huffman Codding method, LZW method of Lossless Compression and Compression Ratio
This paper proposes an approach to implement public key algorithm in Steganography. Here, in this paper, Public key algorithm is used based on RSA assumptions with traditional LSB modification scheme for Steganography to randomize the position of the secret bit in cover image.
A new algorithm for data compression technique using vlsiTejeswar Tej
HOW COMPRESSION IS POSSIBLE?????????
NOW A DAYS LOT OF ALGORITHMS ARE READY TO COMPRESS DATA BUT POWER IS THE MAJOR CRITERIA OF ALL.BUT MY PROJECT IS TO OVERCOME IT I..E THE NEW ALGORITHM BY
K-RLE
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Image compression using negative formateSAT Journals
Abstract This project deals with the compression of digital images using the concept of conversion of original image to negative format. The colored image can be of larger size whereas the image can be converted into a negative form and compressed, by applying a compression algorithm on it. Image compression can improve the performance of digital systems by reducing the time and cost for the storage of images and their transmission, without significant reduction in quality and also to find a tool for compress a folder and selective image compression. Keywords: Image Processing, Pixels, Image Negatives, Colors, Color Models.
Coding and Indexing Shape Feature using Golomb-Rice Coding for CBIR ApplicationsIJERDJOURNAL
ABSTRACT:- The Content-Based Image Retrieval application uses large amount of low-level features of images for retrieving relevant images. Numerous low-level features are used for retrieval and among them the shape based feature is important and can be represented in the form of histogram. It is well known that the low-level feature requires more storage space and thus entire content has to be coded, indexed etc. to reduce the storage requirement, feature processing time and accessing time. In this work, indexing and encoding mechanism is proposed to effectively access the feature and represent the feature in lesser space. The bin values are used as reference for reducing the dimension of the histogram. The non-zero values are coded using Golomb-Rice coding and represented as compact histogram. The size of the compact histogram is variable in size and thus a similarity measure is proposed to handle the issue. Various well-known benchmark datasets are used for experiments to evaluate the performance. It is found that the truncated and encoded histogram performs well and achieves high precision of retrieval.
A Critical Review of Well Known Method For Image CompressionEditor IJMTER
The increasing attractiveness and trust in a digital photography will rise its use for
visual communication. But it requires storage of large quantities of data. For that Image compression
is a key technology in transmission and storage of digital images. Compression of an image is
significantly different then compression of binary raw data. Many techniques are available for
compression of the images. But in some cases these techniques will reduce the quality and originality
of image. For this purpose there are basically two types are introduced namely lossless and lossy
image compression techniques. This paper gives intro to various compression techniques which is
applicable to various fields of image processing.
A young astronomer’s by now ten years old
results are re-told and put in perspective. The implications are
far-reaching. Angular-momentum shows its clout not only in
quantum mechanics where this is well known, but is also a
major player in the space-time theory of the equivalence
principle and its ramifications. In general relativity, its
fundamental role was largely neglected for the better part of a
century. A children’s device – a friction-free rotating bicycle
wheel suspended from its hub that can be lowered and pulled
up reversibly – serves as an eye-opener. The consequences are
embarrassingly far-reaching in reviving Einstein’s original
dream
Bio-char can be produced by thermal conversion of
biomass. Palm shells were obtained from palm fruits (palmira).
They were air-dried to remove moisture. The dried palm shells
were ground to become powder and heated at 600ºC, 800ºC and
1000ºC for 2 h respectively. After heating, bio-char was obtained.
Structural properties of palm shell powder and bio-char were
examined by X-ray diffraction (XRD). Scanning electron
microscopy (SEM) was used to observe microstructure of biochar.
Properties such as hydration capacity, pH were also
evaluated.
Image compression: Techniques and ApplicationNidhi Baranwal
This presentation involves a mathematical view of image compression having a brief introduction of its theory,major techniques along with their algorithm and examples.
Data Compression, Lossy and Lossless Data Compression,Classification of Lossy and Lossless Data Compression, Huffman Codding method, LZW method of Lossless Compression and Compression Ratio
This paper proposes an approach to implement public key algorithm in Steganography. Here, in this paper, Public key algorithm is used based on RSA assumptions with traditional LSB modification scheme for Steganography to randomize the position of the secret bit in cover image.
A new algorithm for data compression technique using vlsiTejeswar Tej
HOW COMPRESSION IS POSSIBLE?????????
NOW A DAYS LOT OF ALGORITHMS ARE READY TO COMPRESS DATA BUT POWER IS THE MAJOR CRITERIA OF ALL.BUT MY PROJECT IS TO OVERCOME IT I..E THE NEW ALGORITHM BY
K-RLE
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Image compression using negative formateSAT Journals
Abstract This project deals with the compression of digital images using the concept of conversion of original image to negative format. The colored image can be of larger size whereas the image can be converted into a negative form and compressed, by applying a compression algorithm on it. Image compression can improve the performance of digital systems by reducing the time and cost for the storage of images and their transmission, without significant reduction in quality and also to find a tool for compress a folder and selective image compression. Keywords: Image Processing, Pixels, Image Negatives, Colors, Color Models.
Coding and Indexing Shape Feature using Golomb-Rice Coding for CBIR ApplicationsIJERDJOURNAL
ABSTRACT:- The Content-Based Image Retrieval application uses large amount of low-level features of images for retrieving relevant images. Numerous low-level features are used for retrieval and among them the shape based feature is important and can be represented in the form of histogram. It is well known that the low-level feature requires more storage space and thus entire content has to be coded, indexed etc. to reduce the storage requirement, feature processing time and accessing time. In this work, indexing and encoding mechanism is proposed to effectively access the feature and represent the feature in lesser space. The bin values are used as reference for reducing the dimension of the histogram. The non-zero values are coded using Golomb-Rice coding and represented as compact histogram. The size of the compact histogram is variable in size and thus a similarity measure is proposed to handle the issue. Various well-known benchmark datasets are used for experiments to evaluate the performance. It is found that the truncated and encoded histogram performs well and achieves high precision of retrieval.
A Critical Review of Well Known Method For Image CompressionEditor IJMTER
The increasing attractiveness and trust in a digital photography will rise its use for
visual communication. But it requires storage of large quantities of data. For that Image compression
is a key technology in transmission and storage of digital images. Compression of an image is
significantly different then compression of binary raw data. Many techniques are available for
compression of the images. But in some cases these techniques will reduce the quality and originality
of image. For this purpose there are basically two types are introduced namely lossless and lossy
image compression techniques. This paper gives intro to various compression techniques which is
applicable to various fields of image processing.
A young astronomer’s by now ten years old
results are re-told and put in perspective. The implications are
far-reaching. Angular-momentum shows its clout not only in
quantum mechanics where this is well known, but is also a
major player in the space-time theory of the equivalence
principle and its ramifications. In general relativity, its
fundamental role was largely neglected for the better part of a
century. A children’s device – a friction-free rotating bicycle
wheel suspended from its hub that can be lowered and pulled
up reversibly – serves as an eye-opener. The consequences are
embarrassingly far-reaching in reviving Einstein’s original
dream
Bio-char can be produced by thermal conversion of
biomass. Palm shells were obtained from palm fruits (palmira).
They were air-dried to remove moisture. The dried palm shells
were ground to become powder and heated at 600ºC, 800ºC and
1000ºC for 2 h respectively. After heating, bio-char was obtained.
Structural properties of palm shell powder and bio-char were
examined by X-ray diffraction (XRD). Scanning electron
microscopy (SEM) was used to observe microstructure of biochar.
Properties such as hydration capacity, pH were also
evaluated.
This study was designed to evaluate the effect of
70% ethanolic crude extract of Portulaca oleracea L on mice
orgons . (In vivo),In vivo, the acute toxicity of 70 % ethanolic
extract of the plant on normal mice was studied. No toxic effect
was noted on normal mice even at 9500 mg /kg B.W S/C
injection.Histopathological changes due to ethanolic extract of
the plant in healthy mice were summarized in hyperplasia of
white pulp with amyloid deposition, proliferation of
megakaryocytes and mononuclear cell infiltration in the liver and
kidney parenchyma. There were no significant lesions detected in
the brain, heart and ovary in all treated groups.
This research deals with study of Degradation
behavior of starch blended with different percentage of
polypropylene (PP) .Twin screw extruder at 160- 190 °C and 50
rpm is used for manufacture of blend sheet. Degradation test
achieved according to ASTM standard (D 638 IV and D570-98).
Studies on their degradation properties were carried out by Soil
burial test, Water absorption test and Hydrolysis test. The
morphology test of the polypropylene / starch blend samples
was obviously seen in the (Dino- Light- Digital Microscope),
Results of soil burial test show that tensile strength and
percentage of elongation of polypropylene / starch blend
decrease with increasing the starch content and burial time. The
hydrolysis test show the weight losses increasing with the
increasing amount of starch. High percent of polypropylene
found to decrease the amount of water absorption of the blend.
The physical appearance and morphology studies of
polypropylene / starch blend after burial test in soil and
hydrolysis in water environment showed that all blend samples
was obviously changed after 90-day study period, whereas the
pure polypropylene samples remained unchanged
This study aims to employ low-cost agro waste
biosorbent tamarind (Tamarindus indica) pod shells and
activated carbon prepared by complete and partial pyrolysis of
tamarind pod shell for the removal of hexavalent chromium
ions from aqueous solution. The effect of parameters namely,
initial metal ion concentration, pH, temperature, biomass
loading on chromium removal efficiency were studied. More
than 96.9% removal of Chromium was achieved using crude
tamarind pod shells as biosorbent. The experimental data
obtained were fitted with Langmuir, Freundlich, Temkin and
Redlich-Peterson adsorption isotherm models. The
experimental data fits well to Langmuir, Freundlich and
Temkin isotherms with regression coefficient R2 more than 0.9.
For Redlich-Peterson adsorption isotherm the experimental
data does not fit so well. The crude tamarind had maximum
monolayer adsorption capacity of 40 mg/g and a separation
factor of 0.0416 indicating it as best adsorbent among the three
tested adsorbent. Further, an attempt is made to fit sorption
kinetics with pseudo first order and pseudo second order
reactions. Pseudo second order kinetics model fits well to the
experimental data for all three adsorbents.
Cloud computing solves the problem of real
time demand information and visibility at different location by
which information can be delivered with reliability, scalability
and flexibility between the supplier and customer. Logistics
network requires effective information flow for technical support
by which logistics infrastructures can be totally utilized and
tracked the information collection, transmission and operation.
Cloud is fast growing technology which can effectively reduce the
intermediate cost of flow of information and improve the link
between the logistics partners and customers. This paper
analyzes the advantages of cloud based logistics network and
defines in which way a logistics network manages Information
Flow Control (IFC) over the cloud, which allows the logistics
network to do work effectively.
On the surface a packet is a chunk of information
but at the deeper level a packet is one unit of binary data capable
of being transferred through a network. Delivering data packets
for highly dynamic mobile ad hoc networks in a reliable and
timely manner. Driven by this issue, an efficient Position-based
Opportunistic Routing (POR) protocol which takes advantage of
the stateless property of geographic routing. In proactive routing
protocols the route discovery and recovery procedures are time
and energy consuming process. Once the path breaks, data
packets will get lost or be delayed for a long time until the
reconstruction of the route, causing transmission interruption.
but Geographic routing (GR) uses location information to
forward data packets, in a hop-by-hop routing fashion. Greedy
forwarding is used to select next hop forwarder with the largest
positive progress toward the destination while void handling
mechanism is triggered to route around communication voids. No
end-to-end route need to be maintained, leading to GR’s high
efficiency and scalability. In the operation of greedy forwarding,
the neighbour which is relatively far away from the sender is
chosen as the next hop. If the node moves out of the sender’s
coverage area, the transmission will fail. In GPSR (a very famous
geographic routing protocol), the MAC-layer failure feedback is
used to offer the packet another chance to reroute.
The technical study had been performed on
many foreign languages like Japanese; Chinese etc. but the
efforts on Indian ancient script is still immature. As the Modi
script language is ancient and cursive type, the OCR of it is still
not widely available. As per our knowledge, Prof. D.N.Besekar,
Dept. of Computer Science, Shri. Shivaji College of Science,
Akola had proposed a system for recognition of offline
handwritten MODI script Vowels. The challenges of
recognition of handwritten Modi characters are very high due
to the varying writing style of each individual. Many vital
documents with precious information have been written in
Modi and currently, these documents have been stored and
preserved in temples and museums. Over a period of time these
documents will wither away if not given due attention. In this
paper we propose a system for recognition of handwritten
Modi script characters; the proposed method uses Image
processing techniques and algorithms which are described
below.
General Terms
Preprocessing techniques: Gray scaling, Thresholding,
Boundary detection, Thinning, cropping, scaling, Template
generation. Other algorithms used- Average method, otsu
method, Stentiford method, Template-based matching method
To help corporations survive amidst worldwide
quality competition, the authors have focused on the strategic
development of a Higher-Cycled Product Design CAE Model
employing a Highly Reliable CAE Analysis Technology
Component Model. Their efforts are part of principle-based
research aimed at evolving product design and CAE development
processes to ensure better quality assurance. To satisfy the
requirements of developing and producing high quality products
while also reducing costs and shortening development times, the
effectiveness of this model was verified by successfully applying it
to the technological problems of loosening bolts and other
product design bottlenecks at auto manufacturers.
When a ductile material with a crack is loaded in
tension, the deformation energy builds up around the crack tip
and it is understood that at a certain critical condition voids are
formed ahead of the crack tip. The crack extension occurs by
coalescence of voids with the crack tip. The “characteristic
distance” (Lc) defined as the distance b/w the crack tip & the void
responsible for eventual coalescence with the crack tip. Nucleation
of these voids is generally associated with the presence of second
phase particles or grain boundaries in the vicinity of the crack tip.
Although approximate, Lc assumes a special significance since it
links the fracture toughness to the microscopic mechanism
considered responsible for ductile fracture. The knowledge of the
“characteristic distance” is also crucial for designing the size of
mesh in the finite element simulations of material crack growth
using damage mechanics principles. There is not much work
(experimental as well as numerical) available in the literature
related to the dependency of “characteristic distance” on the
fracture specimen geometry. The present research work is an
attempt to understand numerically, the geometry dependency of
“characteristic distance” using three-dimensional FEM analysis.
The variation of “characteristic distance” parameter due to the
change of temperature across the fracture specimen thickness was
also studied. The work also studied the variation of “characteristic
distance”, due to the change in fracture specimen thickness.
Finally, the ASTM requirement of fracture specimen thickness
criteria is evaluated for the “characteristic distance” fracture
parameter. “Characteristic distance” is found to vary across the
fracture specimen thickness. It is dependent on fracture specimen
thickness and it converges after a specified thickness of fracture
specimen. “Characteristic distance” value is also dependent on the
temperature of ductile material. In Armco iron material, it is
found to decrease with the increase in temperature.
-In the field of Agriculture most important things
are fertility of soil, nutrition’s available in soil, water availability
in that area, atmospheric conditions .All these parameters are
playing the measure roll regarding the productivity of crop .In
this paper we are trying to go through the techniques which will
show us how to improve productivity with the minimum use of
natural resources like water, and avoid leaching of soil by using
fertilizers through drip. This can be used in greenhouse or open
environments to efficiently monitor soil moisture and
temperature, ambient temperature, and humidity. Wired
communications, sensor networks, and other complementary
technologies provide the necessary tools to compile and processes
physical variables, including temperature, humidity, and soil
moisture, pH of soil, fertilizer concentrations. Greenhouse and
precision agricultural, in general, demand real-time precise
measurement of these parameters in order to avoid unnecessary
exposure to unhealthy ambient conditions, assure maximum
productivity and provide value-added quality. This paper aims to
implement the basic application of automizing the irrigation field
by programming the components and building the necessary
hardware with ARM7 Processor. This is used to find the exact
field condition and maintaining their levels in the soil
In current year, endurable and entire renewable
energy resources are extensively used in electrical energy
generation system. Mainly, solar energy conservation systems
are apply in stand -alone system. Solar panels covert solar
radiation into direct electrical energy. Solar panels are one of
the most potential renewable energy technologies for refreshing
building. In this study, responsibility analysis of a solar system
installed in my collage academic block and hostel is
investigated. The system includes solar panel, battery,
generator, converter and loads. In this study we calculate
overall load in academic block (Electrical engineering
department and round building) and only boy hostel. After
knowing overall loads result for these buildings we simulate
this data through HOMER tool and we obtain the best result
which is presented in this paper.
The result obtained from the optimization gives the initial
capital cost as 296.000$ while operating cost is 2,882$/yr. Total
net present cost (NPC) is 332,846$ and the cost of energy
(COE) is 0.212$/kWh.
The main purpose of this research paper is that the
maximum demand of energy consumption for both academic
block and hostel are simulated through solar panel, for this
purpose which amount of solar panel and battery is required.
A supply chain consists of all parties involved
directly or indirectly, in fulfilling a customer request. The supply
chain includes not only the manufacturers and suppliers, but also
transporters, workhouse, retailers and even customers
themselves. Within each organization, such as a manufactures,
the supply chain includes all functions involved in receiving and
filling a customer request. These functions include, but are not
limited to, new product development, marketing operations,
distributions, finance, and customer service. Supply chain
management (SCM) is the management of an interconnected or
interlinked between network, channel and node businesses
involved in the provision of product and service packages
required by the end customers in a supply chain. Supply chain
management spans the movement and storage of raw materials,
work-in-process inventory, and finished goods from point of
origin to point of consumption. It is also defined as the "design,
planning, execution, control, and monitoring of supply chain
activities with the objective of creating net value, building a
competitive infrastructure, leveraging worldwide logistics,
synchronizing supply with demand and measuring performance
globally.
—Stochastic processes have many useful applications
and are taught in several university programmers. In this paper
we are using stochastic process with complex concept on Markov
chains which uses a transition matrix to plot a transition diagram
and there are several examples which explains various type of
transition diagram. The concept behind this topic is simple and
easy to understand.
RFID-based public transport ticketing systems
rely on widespread networks of RFID readers that locate
the user within the transport network in real time to be
able to verify whether he can travel at that time with the
ticket he holds. This paper presents a system that uses that
same RFID-based location information to give the user
navigation indications depending on his current location
provided that the user has indicated beforehand the places
he intends to visit. The system was designed to be costeffectively
deployable on the short term but open for easy
extension. This paper is based on ticketing and
identification of the passenger in the public transport. In
the metropolitan city like Mumbai, Kolkata we have a
severe malfunction of public transport and various
security problems. Firstly, there is a lot of confusion
between the passengers regarding fares which lead to
corruption, Secondly due to mismanagement of public
transport the passengers faces the problem of traffic jam,
thirdly nowadays we have severe security problems in
public transport due anti-social elements.The entire
network comprises of three modules; Base Station Module,
In-Bus Modules and Bus Stop Module. The base station
module consists of monitoring system which includes GSM
and a PC. The In-Bus Modules consists of two
Microcontrollers, GSM Modem, GPS, Zigbee, RFID, LCD
and infrared sensor. RFID for ticketing purpose, GSM,
GPS is used for mobile data transmission and tracking
location. The Zigbee module is also interfaced with the
microcontroller which is used to send the bus information
to bus stop and to get the information from the bus stop to
bus. The Bus Stop Module is fixed at every bus stop
consists of Zigbee node which is interfaced with the
Microcontroller.
Suspended nanoparticles in conventional fluids,
called nanofluids, have been the subject of intensive study
worldwide since pioneering researchers recently discovered the
anomalous thermal behavior of these fluids. The heat transfer from
smaller area is achieved through microchannels. The heat transfer
principle states that maximum heat transfer is achieved in
microchannels with maximum pressure drop across it. In this
research work the experimental and numerical investigation for
the improved heat transfer characteristics of serpentine shaped
microchannel heat sink using Al2O3/water nanofluid is done. The
fluid flow characteristics is also analyzed for the serpentine
shaped micrchannel. The experimental results of the heat
transfer using Al2O3 nanofluid is compared with the numerical
values. The calculations in this work suggest that the best heat
transfer enhancement can be obtained by using a system with an
Al2O3–water nanofluid-cooled micro channel with serpentine
shaped fluid flow
This paper focuses on the numerous techniques that
have been proposed over the years for metamaterial
characterization. These techniques are categorized into
analytical, field averaging and experimental methods, which
provide various methods to determine the complex permittivity,
complex permeability and refractive index of metamaterials.
Space-time adaptive processing (STAP) is a signal
processing technique most commonly used in radar systems where
interference is a problem. The radar signal processor is used to
remove the unintentional cluttering effects caused by ground
reflections and echoes due to sea, desert, forest, etc. and intentional
jamming and make the received signal useful. In this paper a new
approach to STAP based on subspace projection has been described
in detail. According to linear algebra and three dimensional
geometry, if we project a range space on to a subspace spanned by
linearly independent vectors, we can suppress data which is
perpendicular to that subspace. In subspace based technique, the
received data is projected on to a subspace which is orthogonal to
clutter subspace to remove the clutter. The probability of target
detection can be find out in order to analyse the performance of the
proposed algorithm. Two existing algorithms, SMI and DPCA are
chosen to do the comparison. while plotting the detection Probability
against SINR , the results obtained are better for subspace technique
than DPCA and SMI. We got the SINR improved for subspace based
technique for same detection probability. The effect of subspace rank
on SINR was also analysed for understanding the computational load
caused by the technique. We also analysed the convergence of the
algorithm by taking plots of SINR against range snapshots.
Due to increase demand of energy, increasing price
of petroleum fuels, depletion of petroleum fuels, and
environmental pollution by these fuel emissions, it is very
necessary to find the alternative fuels. This work focused on use
of hybrid blends of Karanja and Cottonseed oil Biodiesels. In this
work 20% and 25% blends are used and the performance and
emission tests were conducted on single cylinder, 4-stroke, water
cooled CI engine by running the engine at a speed of 1500rpm, at
a compression ratio of 16.5:1 and at an injection pressure of
205bar and performance parameters like BP, BSFC, BTE and
the emissions like CO, HC and NOx are compared. It was found
that the blends gave comparatively good results in respect of
performance and emissions.
The Application Programming Interface restricts
the types of queries that the Web service can answer. For
instance, a Web service might provide a method that returns the
books of a given author in fast manner, but it might not provide a
method that returns the authors of a given book. If the user asks
for the author of some specific book, then the Web service cannot
be called – even though the underlying database might have the
preferred piece of information, this scenario is called asymmetry.
This asymmetry is particularly problematic if the service is used
in a Web service orchestration system. In this survey, we propose
to use on-the-fly information extraction (IE).IE used to collect
values, and then the value can be used as parameter Bindings for
the Web service. This survey shows how the information
extraction can be integrated into a Web service orchestration
system. The proposed approach is fully implemented in a
prototype called Search Using Services and Information
Extraction (SUSIE). Real-life data and services are used to
demonstrate the practical viability and good performance of our
approach
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
On Text Realization Image SteganographyCSCJournals
In this paper the steganography strategy is going to be implemented but in a different way from a different scope since the important data will neither be hidden in an image nor transferred through the communication channel inside an image, but on the contrary, a well known image will be used that exists on both sides of the channel and a text message contains important data will be transmitted. With the suitable operations, we can re-mix and re-make the source image. MATLAB7 is the program where the algorithm implemented on it, where the algorithm shows high ability for achieving the task to different type and size of images. Perfect reconstruction was achieved on the receiving side. But the most interesting is that the algorithm that deals with secured image transmission transmits no images at all
An LSB Method Of Image Steganographic TechniquesIJERA Editor
The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message [1]. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet [2]. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
It is mainly focused today to transfer the messages secretly between two communication parties. The message from the sender to receiver should be kept secret so that the information should not known by anyone. Secret is the important thing today. The technique that is used for secure communication is called as steganography and it means that to hide secret information into innocent data. Digital images are ideal for hiding secret information. An image containing a secret message is called a cover image. In this paper will discuss about secret transformation of audio messages. The audio messages are hidden inside a cover image so no one can hack the audio but the audio should be encrypted before hidden inside the image
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
Steganography is the art and science of hiding the actual important information under graphics, text, cover file etc. These techniques may be applied without fear of image destruction because they are more integrated into the image. Information can be in the form of text, audio, video. The purpose of steganography is to covert communication and to hide a message from a third party or intruder. Steganography is often confused with cryptography because the two are similar in the way that both are used to protect confidential information. Though there are many types of steganography, video Steganography is more reliable due to high capacity image, more data embedment, perceptual redundancy etc. This research paper deals with various Video Steganography techniques and algorithms including Spatial Domain, Pseudorandom permutations, TPVD (Tri-way pixel value differencing), Motion Vector Technique, Video Compression, and Motion Vector Technique. The Video compression which uses modern coding techniques to reduce redundancy in video data has been also studied and analyzed. In fact, Video compression operates on square-shaped groups or blocks of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form for the spatial variables in the underlying image, such as three steps search, etc. The study also discusses and focusses on the evolution of the Video Steganography techniques and algorithms over the years based on its application and subsequent merits and demerits. Further, Advanced Video Steganography Algorithm/Bit Exchange Method based on the bit shifting and XOR operation in the secret message file has been studied and implemented. The encrypted secret message is embed in the cover file in alternate byte. The bits are substituted in LSB & LSB+3 bits in the cover file. Finally, the simulation and evaluation of the above mentioned approach is performed using MATLAB tools.
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].
For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
Similar to EFFICIENT DATA HIDING SYSTEM USING LZW CRYPTOGRAPHY AND GIF IMAGE STEGANOGRAPHY (20)
Recent joint surgery studies reveal increased
revisions and resurfacing of the metal on metal hip joints. Metal
on metal hip implants were developed more than thirty years ago
and their application has been refined because of availability of
advanced manufacturing techniques and partly by advancements
in material science and engineering. Development of composite
materials may provide greater durability to metal-on-metal hip
implants .This review article is a study of the latest literature of
metal-on-metal hip implants and its various modeling techniques.
Numbers of methods are used for convergence and numerical
solution to investigate the performance of metal-on-metal hip
implant for accurate stable solution. This paper presents analysis
done by various researchers on metal-on-metal hip implants for
wear, lubrication, fatigue, bio-tribo-corrosion, design, toxicity
and resurfacing. After in vivo and in vitro studies, it is found that
all these methods have limitations. There is a need of more
insight for lubrication analysis, geometry of bearings, materials
and input parameters. The information provided in this work is
intended as an aid in the assessment of metal-on-metal hip joints.
Background Hospital contributes significantly tangible and intangible resources on a concurred plan by the scheduling of surgery on the OT list. Postponement decreases efficiency by declining throughput leads to wastage of resources hence burden to the nation. Patients and their family face economic and emotional implication due to the postponement. Postponement rate being a quality indicator controls check mechanism could be developed from the results. Postponement of elective scheduled operations results in inefficient use of the operating room (OR) time on the day of surgery. Inconvenience to patients and families are also caused by postponements. Moreover, the day of surgery (DOS) postponement creates logistic and financial burden associated with extended hospital stay and repetitions of pre-operative preparations to an extent of repetition of investigations in some cases causing escalated costs, wastage of time and reduced income. Methodology A cross-sectional study was done in the operation theaters of a tertiary care hospital in which total ten operation theaters of General Surgery Data of scheduled, performed and postponed surgeries was collected from all the operation theater with effect from March 1st to September 30th, 2018. A questionnaire was developed to find out the reasons for the postponement for all hospital’s stakeholders (surgeons, Anesthetist, Nursing Officer) and they were further evaluated time series analysis of scheduling of Operation Theater for moving average technique. Results Total 958 surgeries were scheduled and 772 surgeries performed were and 186 surgeries were postponed with a postponement rate of 19.42% in the cardiac surgery department during the study period. Month-wise postponement Rate exponential smoothing of time series data shows the dynamic of operating suits. To test throughput Postponement rate was plotted the postponed surgeries and on regression analysis is in a perfect linear relationship.
Introduction: Postponement of elective scheduled operations results in inefficient use of operating room (OR) time on the day of surgery. Inconvenience to patients and families also caused by postponements. Moreover, day of surgery (DOS) postponement creates logistic and financial burden associated with extended hospital stay and repetitions of pre-operative preparations to an extend of repetition of investigations in some cases causing escalated costs, wastage of time and reduced income. Methodology: A cross sectional study was done in the operation theaters of a tertiary care hospital in which total ten operation theaters of General Surgery Data of scheduled, performed and postponed surgeries was collected from all the operation theater with effect from march 1st to September 30th 2018. A questionnaire was developed to find out the reasons for the postponement for all hospital’s stakeholders (Surgeons, Anesthetist, Nursing officer) and they were further evaluated Time series analysis of scheduling of Operation Theater for Moving average Technique. Results: total 2,466 surgeries were scheduled and 1,980 surgeries were performed and 486 surgeries were postponed in the general surgery department during the study period. Month wise postponement forecast was in accordance with the performed surgeries and on regression analysis postponed surgeries were in perfect linear relationship with the postponement Rate.
In the present paper the experimental study of
Nanotechnology involves high cost for Lab set-up and the
experimentation processes were also slow. Attempt has also
been made to discuss the contributions towards the societal
change in the present convergence of Nano-systems and
information technologies. one cannot rely on experimental
nanotechnology alone. As such, the Computer- simulations and
modeling are one of the foundations of computational
nanotechnology. The computer modeling and simulations
were also referred as computational experimentations. The
accuracy of such Computational nano-technology based
experiment generally depends on the accuracy of the following
things: Intermolecular interaction, Numerical models and
Simulation schemes used. The essence of nanotechnology is
therefore size and control because of the diversity of
applications the plural term nanotechnology is preferred by
some nevertheless they all share the common feature of control
at the nanometer scale the latter focusing on the observation
and study of phenomena at the nanometer scale. In this paper,
a brief study of Computer-Simulation techniques as well as
some Experimental result
Solar cell absorber Kesterite- type Cu2ZnSnS4 (CZTS) thin films have been prepared by Chemical Bath Deposition (CBD). UV–vis absorption spectra measurement indicated that the band gap of as-synthesized CZTS was about1.68 eV, which was near the optimum value for photovoltaic solar conversion in a single-band-gap device. The polycrystalline CZTS thin films with kieserite crystal structure have been obtained by XRD. The average of crystalline size of CZTS is 27 nm
Multilevel inverters play a crucial part in the
areas of high and medium voltage applications. Among the three
main multilevel inverters used, the capacitor clamped multilevel
inverter(CCMLI) has advantage with respect to voltage
redundancies. This work proposes a switching pattern to improve
the performance of chosen H-bridge type CCMLI over
conventional CCMLI. The PWM technique used in this work is
Phase Opposition Disposition PWM(PODPWM). The
performance of proposed H-bridge type CCMLI is verified
through MATLAB-Simulink based simulation. It has been
observed that the THD is low in chosen CCMLI compared to
conventional CCMLI.
- In this paper, we introduce a practical mechanism of
compressing a binary phase code modulation (BPCM) signal
according to Barker code with 13 chips in presence of additive
white Gaussian noise (AWGN) by using a digital matched filter
(DMF) corresponding to time domain convolution algorithm of
input and reference signals using Cyclone II EP2C70F896C6
FPGA from ALTERA placed on education and development
board DE2-70 with the following parameters: frequency of
BPCM signal fIF=2 MHz, sampling frequency
f MHz SAM 50
,pulse period
T 200s
, pulse width
S 13sc
, chip width
CH 1sc
, compressing factor
KCOM 13
, SNRinp=1/1, 1/2, 1/3, 1/4, 1/5 and processing
gain factor SNRout/SNRinp=11.14 dB.
The results of filter operation are evaluated using a digital
oscilloscope GDS-1052U to display the input and output signals
for different SNRinp.
Flooding is one of the most devastating natural
disasters in Nigeria. The impact of flooding on human activities
cannot be overemphasized. It can threaten human lives, their
property, environment and the economy. Different techniques
exist to manage and analyze the impact of flooding. Some of these
techniques have not been effective in management of flood
disaster. Remote sensing technique presents itself as an effective
and efficient means of managing flood disaster. In this study,
SPOT-10 image was used to perform land cover/ land use
classification of the study area. Advanced Space borne Thermal
Emission and Reflection Radiometer (ASTER) image of 2010 was
used to generate the Digital Elevation Model (DEM). The image
focal statistics were generated using the Spatial Analyst/
Neighborhood/Focal Statistics Tool in ArcMap. The contour map
was produced using the Spatial Analyst/ Surface/ Contour Tools.
The DEM generated from the focal statistics was reclassified into
different risk levels based on variation of elevation values. The
depression in the DEM was filled and used to create the flow
direction map. The flow accumulation map was produced using
the flow direction data as input image. The stream network and
watershed were equally generated and the stream vectorized. The
reclassified DEM, stream network and vectorized land cover
classes were integrated and used to analyze the impact of flood on
the classes. The result shows that 27.86% of the area studied will
be affected at very high risk flood level, 35.63% at high risk,
17.90% at moderate risk, 10.72% at low risk, and 7.89% at no
risk flood level. Built up area class will be mostly affected at very
high risk flood level while farmland will be affected at high risk
flood level. Oshoro, Imhekpeme, and Weppa communities will be
affected at very high risk flood inundation while Ivighe, Uneme,
Igoide and Iviari communities will be at risk at high risk flood
inundation level. It is recommended among others that buildings
that fall within the “Very High Risk” area should be identified
and occupants possibly relocated to other areas such as the “No
Risk” area.
Without water, humans cannot live. Since time began,
we have lived by the water and vast tracts of waterless land have
been abandoned as it is too difficult to inhabit. At any given
moment, the earth’s atmosphere contains 4,000 cubic miles of
water, which is just 0.000012% of the 344 million cubic miles of
water on earth. Nature maintains this ratio via evaporation and
condensation, irrespective of the activities of man.
There is a certain need for an alternative to solve the water
scarcity. Obtaining water from the atmosphere is nothing new -
since the beginning of time, nature’s continuous hydrologic cycle
of evaporation and condensation in the form of rain or snow has
been the sole source and means of regenerating wholesome water
for all forms of life on earth.
An effective method to generate water is by the separation of
moisture present in air by condensation. In this study, the water
present in air is condensed on the surface of a container and then
collected in an external jacket provided on the container.
Insulations are provided to optimize the inner temperature of the
container.
The method is although uncommon but has certain advantages
which make it a success. The process is economical and does not
require a lot of utilities. It also helps in further reducing the
carbon footprint.
In every moment of functioning the Li-Ion
battery must provide the power required by the user, to have a
long operating life and to and to provide high reliability in
operation. The methods for analysis and testing batteries are
ensuring that all these conditions imposed to the batteries are
met by being tested depending on their intended use.
The success rate of real estate project is
decreasing as there is large scale of project and participation of
entities. It is necessary to study the risk factors involved in the
project. This paper focused on types of risks involved in the
project, risk factors, risk management tools & techniques.
Identification of risk of the project in terms of the total cost of the
project has been divided under Technical, Financial, Sociopolitical
and Statutory cost centers. Large real estate projects
have to tackle the following issues: land acquisition, skilledlabour
shortage, non-availability of skilled project managers, and
mechanization of the construction process to cater to the growing
demands. Non- availability of supporting infrastructure, political
issues like instability of the government leading to regulatory
issues, social issues, marketing forms an important part in these
projects as this is a onetime investment and the purchase cycle is
long , long development period makes the same project be at
different points in the real estate value cycle.
- In the present scenario carbon emission and sand
mining are major concern due to its hazardous effect to
environment and making serious imbalance to the ecosystem.
Various studies have been conducted to reduce severe effect on
environment, using byproducts like copper slag as partial
replacement of fine aggregate. Different researchers have also
revealed numerous uses of copper slag as a replacing agent in
determining the strength of concrete. A comprehensive review of
studies has been presented in this paper for scope of replacement
of fine aggregate from copper slag in concrete
- Security is a concept similar to being cautious
or alert against any danger. Network security is the condition of
being protected against any danger or loss. Thus safety plays a
important role in bank transactions where disclosure of any data
results in big loss. We can define networking as the combination
of two or more computers for the purpose of resource sharing.
Resources here include files, database, emails etc. It is the
protection of these resources from unauthorized users that
brought the development of network security. It is a measure
incorporated to protect data during their transmission and also
to ensure the transmitted is protected and authentic.
Security of online bank transactions here has been
improved by increasing the number of bits while establishing the
SSL connection as well as in RSA asymmetric key encryption
along with SHA1 used for digital signature to authenticate the
user
Background: Septoplasty is a common surgical
procedure performed by otolaryngologists for the correction of
deviated nasal septum. This surgery may be associated with
numerous complications. To minimize these complications,
otolaryngologists frequently pack both nasal cavities with
different types of nasal packing. Despite all its advantages,
nasal packing is also associated with some disadvantages. To
avoid these issues, many surgeons use suturing techniques to
obviate the need for packing after surgery.
Objective: To determine the efficacy and safety of trans-septal
suture technique in preventing complications and decreasing
morbidity after septoplasty in comparison with nasal packing.
Patients and methods: Prospective comparative study. This
study was conducted in the department of Otolaryngology -
Head and Neck Surgery, Rizgary Teaching Hospital - Erbil,
from the 6th of May 2014 to the 30th of November 2014.
A total of 60 patients aged 18-45 years, undergoing septoplasty,
were included in the study. Before surgery, patients were
randomly divided into two equal groups. Group (A) with transseptal
suture technique was compared with group (B) in which
nasal packing with Merocel was done. Postoperative morbidity
in terms of pain, bleeding, postnasal drip, sleep disturbance,
dysphagia, headache and epiphora along with postoperative
complications including septal hematoma, septal perforation,
crustation and synechiae formation were assessed over a follow
up period of four weeks.
Results: Out of 60 patients, 37 patients were males (61.7%)
and 23 patients were females (38.3%). Patients with nasal
packing had significantly more postoperative pain (P<0.05)><0.05). There was no significant difference between
the two groups with respect to nasal bleeding, septal
hematoma, septal perforation, crustation and synechiae
formation.
Conclusion: Septoplasty can be safely performed using transseptal
suturing technique without nasal packing.
The basic reason behind the need to
monitor water quality is to verify whether the examined
water quality is suitable for intended usage or not. This
study is conducted on Al -Shamiya al- sharqi drain in
Diwaniya city in Iraq to make valid assessment for the
level of parameters measured and to realize their effects
on irrigation. In order to assess the drainage water
quality for irrigation purposes with a high accuracy, the
Irrigation Water Quality Index (IWQI) will be examined
and upgraded (integrated with GIS) to make a
classification for drainage water. For this purpose, ten
samples of drainage water were taken from different ten
location of the stuay area. The collected samples were
analyzed chemically for different elements which affect
water quality for irrigation.These elements are :
Calcium(Ca+2), Sodium(Na+
), Magnesium(Mg+2),
Chloride( ), Potassium(K+
), Bicarbonate(HCO3),
Nitrate(NO3), Sulfate( , Phosphate( , Electrical
Conductivity(EC), Total Dissolved Solids (TDS), Total
Suspended Solids (TSS) and pH-values (PH). Sodium
Adsorption Ratio (SAR) and Sodium Content (Na%)
have been also calculated. Results suggest that, the use of
GIS and Water Quality Index (WQI) methods could
provide an extremely interesting as well as efficient tool
to water resource management. The results analysis of
(IWQI) maps confirms that: 52% of the drainage water
in study area falls within the "Low restriction" (LR) and
47%of study area has water with (Moderate
restriction)(MR),While 1% of drainage water in the
study area classified as (Sever restriction) (SR). So, the
drainage water should be used with the soil having high
permeability with some constraints imposed on types of
plant for specified tolerance of salts
The cable-hoisting method and rail cable-lifting
method are widely used in the construction of suspension bridge.
This paper takes a suspension bridge in Hunan as an example,
and expounds the two construction methods, and analyzes their
respective merits and disadvantages.
Baylis-Hillman reaction has been achieved on
different organic motifs but with completion times of three to
six days. Micellar medium of CTAB in water along with the
organic base DABCO has been used to effect the BaylisHillman
reaction on a steroidal nucleus of Withaferin-A for the
first time with different aromatic aldehydes within a day to
synthesize a library of BH adducts (W1a –W14a) and (W1bW14b)
as a mixture of two isomers and W15 as a single
compound. The isomers were separated on column and the
major components were chosen for bio-evaluation. Cytotoxic
activity of the synthesized compounds was screened against a
panel of four cancer cell lines Lung A-549, Breast MCF-7,
Colon HCT-116 and Leukemia THP-1 along with 5-florouracil
and Mitomycin-C as references. All the compounds exhibited
promising activity against screened cell lines and were found to
possess enhaunced activity than parent compound. BH adducts
with aromatic systems having methoxy and nitro groups were
found to be more active.
This paper presents the details on the
experimental investigation carried out to get the desired fresh
properties of the SCC. Tests were performed on various mixtures
to obtain the required SCC. In the present research work we
have replaced 15% of cement with class F fly ash. By varying the
quantity of water and sand the mortar mix was prepared. Later
varying percentage of coarse aggregate was added to the mortar
to obtain the desired SCC.
The batteries used in electric and hybrid vehicles
consists of several cells with voltages between 3.6V battery and
4.2 V in series or parallel combinations of configurations for
obtaining the necessary available voltages in the operation of a
hybrid electric vehicle. How malfunction of a single cell affects
the behavior of the entire battery pack, BMS main function is to
protect individual cells against over-discharge, overload or
overheating. This is done by correct balancing of the cells. In
addition BMS estimates the battery charge status
This project aims at using (PD-MCPWM) Phase
disposition multi carrier pulse width modulation technique to
reduce leakage current in a transformerless cascaded multilevel
inverter for PV systems. Advantages of transformerless PV
inverter topology is as follows, simple structure, low weight and
provides higher efficiency , but however this topology provides a
path for the leakage current to flow through the parasitic
capacitance formed between the PV module and the ground.
Modulation technique reduces leakage current with an added
advantage without adding any extra components.
More from International Journal of Technical Research & Application (20)
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
EFFICIENT DATA HIDING SYSTEM USING LZW CRYPTOGRAPHY AND GIF IMAGE STEGANOGRAPHY
1. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 28-32
28 | P a g e
EFFICIENT DATA HIDING SYSTEM USING LZW
CRYPTOGRAPHY AND GIF IMAGE
STEGANOGRAPHY
Intisar Majeed Saleh, Hanaa Hameed Merzah
AL. Rafidain University College
Baghdad, Iraq
Intisar_alyssiri@yahoo.com, Hanamerza2007@gmail.com
Abstract— The combination of steganography and
cryptography is considered as one of the best security methods
used for message protection, due to this reason, in this paper, a
data hiding system that is based on image steganography and
cryptography is proposed to secure data transfer between the
source and destination. Animated GIF image is chosen as a
carrier file format for the steganography due to a wide use in web
pages and a LSB (Least Significant Bits) algorithm is employed to
hide the message inside the colors of the pixels of an animated
GIF image frames. To increase the security of hiding, each frame
of GIF image is converted to 256 color BMP image and the
palette of them is sorted and reassign each pixels to its new index,
furthermore, the message is encrypted by LZW ( Lempel _
Ziv_Welch) compression algorithm before being hidden in the
image frames. The proposed system was evaluated for
effectiveness and the result shows that, the encryption and
decryption methods used for developing the system make the
security of the proposed system more efficient in securing data
from unauthorized users. The system is therefore, recommended
to be used by the Internet users for establishing a more secure
communication.
Keywords:- Steganography, LSB, Animated GIF, LZW.
I. INTRODUCTION
The cryptography and steganography techniques occupies a
distinctive place in the area of security as they help to solve
the problem of transmission of confidential information over
the network in the form of a more secure against violations of
unauthorized persons . Cryptography is the art and science of
creating nonreadable data or cipher so that only intended
person is only able to read the data[1], Unfortunately it is
sometimes not enough to keep the contents of a message
secret, it may also be necessary to keep the existence of the
message secret. The technique used to implement this, is
called steganography.Steganography comes from the Greek
words Steganós (Covered) and Graptos (Writing), it usually
refers to information or a file that has been concealed inside a
digital Picture, Video, Text or Audio file[2,3]. For this reason,
in this paper, we focus on the combination of steganography
and cryptography to protect the private information within the
digital image ,and more specifically on the GIF image which
being used widely on the Internet. When information is hidden
inside a carrier file, the data is encrypted with LZW
compression method.
The general scheme for embedding data is depicted in
Figure 1. A message is embedded in a file by the stegosystem
encoder, which has as inputs the original cover, the secret
message and a key. The resulting stego object is then
transmitted over a communication channel to the recipient
where the stegosystem decoder using the same key processes it
and the message can be read.
Fig. 1. A General Steganographic Model
The steganographic process can be represented using
formulas. The stego object is given by:
I' = f( I,m,k )
where: I’ is the stego object, I is the original object, m is the
message and k is the key that the two parties share. The stego
object may be subject to many distortions, which can be
represented as a noise process n:
I'' = I'+n(I')
At the decoder we wish to extract the signal m, so we can
consider the unwanted signal to be I. The embedded signal
should resist common signal distortions as those depicted in
Figure 2. Two kinds of compression exist: lossy and lossless.
Both methods save storage space but have different results.
Lossless compression permits exact reconstruction of the
original message; therefore it is preferred when the original
information must remain intact. Such compression schemes
are the images saved as GIF (Graphic Interchange Format).
Lossy compression, on the other hand, does not maintain the
original’s integrity. Such compression scheme is an image
saved as JPEG (Joint Photographic Experts Group). The JPEG
formats provide close approximations to high-quality digital
photos but not an exact duplicate.
Fig. 2: common signal distortions over the transmission
channel
2. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 28-32
29 | P a g e
+-----------------------+
| +-------------------+ |
| | GIF Signature | |
| +-------------------+ |
| +-------------------+ |
| | Screen Descriptor | |
| +-------------------+ |
| +-------------------+ |
| | Global Color Map | |
| +-------------------+ |
. . . . . .
| +-------------------+ | ---+
| | Image Descriptor | | |
| +-------------------+ | |
| +-------------------+ | |
| | Local Color Map | | |-Repeated 1 ton
times
| +-------------------+ | |
| +-------------------+ | |
| | Raster Data | | |
| +-------------------+ | ---+
. . . . . .
|- GIF Terminator -|
+-----------------------+
Geometric distortions are specific to images and video and
include operations such as: rotation, translation, scaling.
Cropping is another type of geometric distortion that leads to
irretrievable loss of data. The signal can be processed in many
ways, including resampling, analog-to-digital and digital-to-
analog conversions, requantization, recompression, printing,
rescanning, copying, filtering and so on. All those processes
introduce additional degradation into the object that a
steganographic scheme must withstand.[4 ]
II. LEST SIGNIFICANT BIT (LSB)
Least significant bit (LSB) insertion is a common, simple
approach to embedding information in a cover image [5]. In
this method, we can take the binary representation of the
hidden_data and overwrite the LSB of each byte within the
cover_image. If we are using 24-bit color, the amount of
change will be minimal and indiscernible to the human eye. As
an example, suppose that we have three adjacent pixels (nine
bytes) with the following RGB encoding:
10010101 00001101 11001001
10010110 00001111 11001010
10011111 00010000 11001011
Now suppose we want to "hide" the following 9 bits of data
(the hidden data is usually compressed prior to being hidden):
101101101. If we overlay thes 9 bits over the LSB of the 9
bytes above, we get the following (where bits in bold have
been changed):
10010101 00001100 11001001
10010111 00001110 11001011
10011111 00010000 11001011
Note that we have successfully hidden 9 bits but at a cost of
only changing 4, or roughly 50%, of the LSBs. Similar
methods can be applied to 8-bit palette based images (like GIF
images) but the changes, as the reader might imagine, are
more dramatic[6]. This is alleviated in this paper by sorting the
palette and reassigns each pixel to the index of its color in the
new palette before the embedding process.
III. LEMPEL-ZIV-WELCH (LZW)
LZW is a universal lossless data compression algorithm
created by Abraham Lempel, Jacob Ziv, and Terry Welch. It
was published by Welch in 1984 as an improved
implementation of the LZ78 algorithm published by Lempel
and Ziv in 1978. The algorithm is designed to be fast to
implement but is not usually optimal because it performs only
limited analysis of the data.
The compressor algorithm builds a string translation table
from the text being compressed. The string translation table
maps fixed-length codes (usually 12-bit) to strings. The string
table is initialized with all single-character strings (256 entries
in the case of 8-bit characters). As the compressor character-
serially examines the text, it stores every unique two-character
string into the table as a code/character concatenation, with the
code mapping to the corresponding first character. As each
two-character string is stored, the first character is sent to the
output. Whenever a previously-encountered string is read from
the input, the longest such previously-encountered string is
determined, and then the code for this string concatenated with
the extension character (the next character in the input) is
stored in the table. The code for this longest previously-
encountered string is output and the extension character is
used as the beginning of the next word.
The decompressor algorithm only requires the compressed
text as an input, since it can build an identical string table from
the compressed text as it is recreating the original text.
However, an abnormal case shows up whenever the sequence
character/string/character/string/character (with the same
character for each character and string for each string) is
encountered in the input and character/string is already stored
in the string table. When the decompressor reads the code for
character/string/character in the input, it cannot resolve it
because it has not yet stored this code in its table. This special
case can be dealt with because the decompressor knows that
the extension character is the previously-encountered
character.
A. Compressor Algorithm
Build a table and store all possible strings in it
STRING = get input character
WHILE there are still input characters DO
CHARACTER = get input character
IF STRING+CHARACTER is in the string table then
STRING = STRING+character
ELSE
output the code for STRING
add STRING+CHARACTER to the string table
STRING = CHARACTER
END of IF
END of WHILE
output the code for STRING
3. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 28-32
30 | P a g e
B. Decompressor Algorithm
Build a table and store all possible strings in it
Read OLD_CODE
OLD_CODE = get translation of OLD_CODE
output OLD_CODE
CHARACTER = OLD_CODE
WHILE there are still input characters DO
Read NEW_CODE
IF NEW_CODE is not in the string table THEN
STRING = OLD_CODE
STRING = STRING+CHARACTER
ELSE
STRING = get translation of NEW_CODE
END of IF
output STRING
CHARACTER = first character in STRING
add OLD_CODE + CHARACTER to the string table
OLD_CODE = get translation of NEW_CODE
END of WHILE
IV. GRAPHIC INTERCHANGE FORMAT (GIF)
The Graphics Interchange Format (GIF) is a bitmap
image format that was introduced by CompuServe in 1987 and
has since come into widespread usage on the World Wide
Web due to its wide support and portability. The format
supports up to 8 bits per pixel, allowing a single image to
reference a palette of up to 256 distinct colors chosen from the
24-bit RGB color space. It also supports animations and
allows a separate palette of 256 colors for each frame. GIF
images are compressed using the Lempel-Ziv-Welch (LZW)
lossless data compression technique to reduce the file size
without degrading the visual quality.
A. General File Format
The GIF Signature identifies the data following as a
valid GIF image stream. It consists of the following
six characters. The first three characters are G I F and
the last three characters are a version number for this
particular GIF definition.
The Screen Descriptor describes the overall
parameters for all GIF images following. This
information is stored in a series of 8-bit bytes as
described below.
The Global Color Map is optional but recommended
for images where accurate color rendition is desired.
The existence of this color map is indicated in the 'M'
field of byte 5 of the Screen Descriptor. The number
of color map entries following a Screen Descriptor is
equal to 2**(# bits per pixel), where each entry
consists of three byte values representing the relative
intensities of red, green and blue respectively. The
structure of the Color Map block is:
The Image Descriptor defines the actual placement
and extents of the following image within the space
defined in the Screen Descriptor. Also defined are
flags to indicate the presence of a local color lookup
map, and to define the pixel display sequence. The
information stored in image descriptor is:
A Local Color Map is optional. If the 'M' bit of byte
10 of the Image Descriptor is set, then a color map
follows the Image Descriptor that applies only to the
following image. At the end of the image, the color
map will revert to that defined after the Screen
Descriptor. Note that the 'pixel' field of byte 10 of the
Image Descriptor is used only if a Local Color Map is
indicated. This defines the parameters not only for the
image pixel size, but determines the number of color
map entries that follow. The bits per pixel value will
also revert to the value specified in the Screen
Descriptor when processing of the image is complete.
Raster Data: The format of the actual image is
defined as the series of pixel color index values that
bits
7 6 5 4 3 2 1 0 Byte #
+------------------+
| | 1
+-Screen Width -+ Raster width in pixels (LSB first)
| | 2
+-----------------+
| | 3
+-Screen Height-+ Raster height in pixels (LSB first)
| | 4
+-+------+-+------+ M = 1, Global color map follows Descriptor
|M| cr |0|pixe l | 5 cr+1 = # bits of color resolution
+-+-----+-+-----+ pixel+1 = # bits/pixel in image
| background | 6 background=Color index of screen background
+-----------------+ (color is defined from the Global color
|0 0 0 0 0 0 0 0 | 7 map or default map if none specified)
+-----------------+
bits
7 6 5 4 3 2 1 0 Byte #
+---------------+
| red intensity | 1 Red value for color index 0
+---------------+
|green intensity| 2 Green value for color index 0
+---------------+
| blue intensity| 3 Blue value for color index 0
+---------------+
| red intensity | 4 Red value for color index 1
+---------------+
|green intensity| 5 Green value for color index 1
+---------------+
| blue intensity| 6 Blue value for color index 1
+---------------+
: : (Continues for remaining colors)
bits
7 6 5 4 3 2 1 0 Byte #
+---------------+
|0 0 1 0 1 1 0 0| 1 ',' - Image separator character
+---------------+
| | 2 Start of image in pixels from the
+- Image Left -+ left side of the screen (LSB first)
| | 3
+---------------+
| | 4
+- Image Top -+ Start of image in pixels from the
| | 5 top of the screen (LSB first)
+---------------+
| | 6
+- Image Width -+ Width of the image in pixels (LSB first)
| | 7
+---------------+
| | 8
+- Image Height-+ Height of the image in pixels (LSB first)
| | 9
+-+-+-+-+-+-----+ M=0 - Use global color map, ignore 'pixel'
|M|I|0|0|0|pixel| 10 M=1 - Local color map follows, use 'pixel'
+-+-+-+-+-+-----+ I=0 - Image formatted in Sequential order
I=1 - Image formatted in Interlaced order
pixel+1 - # bits per pixel for this image
4. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 28-32
31 | P a g e
make up the image. The image pixel values are
processed as a series of color indices which map into
the existing color map. The resulting color value from
the map is what is actually displayed. This series of
pixel indices, the number of which is equal to image-
width*image-height pixels, are passed to the GIF
image data stream one value per pixel, compressed
and packaged according to a version of the LZW
compression algorithm.
V. THE WORKING SYSTEM ALGORITHMS
a) The Hiding Algorithm
b) The Extracting Algorithm
VI. PRACTICAL IMPLEMENTATION
We have completed a project using this technique using
Visual Basic 6.0. Various animated GIF images are used as
source image and the results are noted. Let us see one of the
results here:
a) Cover Image Frames
Frame1 Frame2
Frame3 Frame4
Frame5 Frame6
Frame7 Frame8
b) The Text Message
You give but little when you give of your possessions. It is
when you give of yourself that you truly give. For what are
your possessions but things you keep and guard for fear you
may need them tomorrow? And tomorrow, what shall
tomorrow bring to the over prudent dog burying bones in the
trackless sand as he follows the pilgrims to the holy city? And
what is fear of need but need itself? Is not dread of thirst when
your well is full, the thirst that is unquenchable?
There are those who give little of the much which they
have--and they give it for recognition and their hidden desire
makes their gifts unwholesome. And there are those who have
little and give it all. These are the believers in life and the
bounty of life, and their coffer is never empty. There are those
who give with joy, and that joy is their reward. And there are
those who give with pain, and that pain is their baptism.
And there are those who give and know not pain in giving,
nor do they seek joy, nor give with mindfulness of virtue;
They give as in yonder valley the myrtle breathes its fragrance
into space. Through the hands of such as these God speaks,
and from behind their eyes He smiles upon the earth.
It is well to give when asked, but it is better to give unasked,
through understanding;
Frame1 Frame2
Frame3 Frame4
Frame5 Frame6
Frame7 Frame8
nd to the open-handed the search for one who shall
receive is joy greater than giving. And is there aught you
5. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 28-32
32 | P a g e
would withhold? All you have shall some day be given;
therefore give now, that the season of giving may be yours and
not your inheritors'
c) Stego-Image Frames
d) The Palette
Before Sorting After Sorting
VII. CONCLUSIONS
1- The processing of compressed a text message by using
LZW compression method considered as an encryption
method, therefore the detection of the hidden message become
more complex.
2- Hide the text in all frames of the animated image and the
animation property of the image make the observation of the
hidden text very difficult.
3- The maximum size of the embedded text message could be
very huge depend on the LZW code of the text and number of
frames in the image.
4- The lossless compression method used in the image and in
the embedded text result to extract the text without any
changes in the message.
REFERENCES
[1] Atul Kahate (2009), Cryptography and Network Security,
2nd edition, McGraw-Hill.
[2] Mohamed Elsading Eltahir, Laiha Mat, B. B Zaidan and A.
A. Zaidan," High Rate Video Streaming Steganography"
,International Conference on Information Management and
Engineering(ICIME09) Session 10,P.P 550-
553,2009.(Conference proceding).
[3] Fazida Othman, Miss Laiha. Maktom, A.Y.TAQA, B. B
Zaidan, A. A Zaidan,"An Extensive Empirical Study for the
impact of Increasing Data Hidden on the Images
Texture",Internatioal Conference on future Computer and
Communication(ICFCC 09),Session 7,P.P 477-
481,2009(Confernce proceding).
[4] Richard Popa "An Analysis of Steganographic
Techniques".
[5] Johnson, N.F. & Jajodia, S., "Exploring Steganography:
Seeing the Unseen",Computer Journal,February 1998.
[6] Murshed, Md. M. "Steganography using LSB hiding
"Upper lowa University Fayette, lowa, USA.
[7] "Graphics Interchange format, Version 87a". 15 June
1987.Retrieved13 October 2012.