The Internet is a collection of shared resources. The present internet architecture has limited support for both securing
and identifying shared Internet resources. As a result, resource exhaustion does occur due to inefficiently scaling systems, selfish
resource consumption and malicious attack. In this context, cryptography can be used to provide confidentiality using encryption
methods and can also provide data integrity, authentication and non-repudiation. The purpose of this paper is to deploy number
systems based cryptography schemes for secure sharing of internet and intranet resources without global protocol redeployment
or architectural support. Quaternionic Farey fractions are used to achieve rotations/orientations in three dimensions. The use of
Quaternionic Farey fractions is preferred in this work, since; they have the proven advantage that combining many quaternion
transformations is more numerically stable than combining many matrix transformations
ANALYSE AND IMPLEMENT OF CRYPTOGRAPHY WITH HIGH SECURITY USING QUATERNIONAM Publications,India
The document discusses cryptography using quaternion numbers. It analyzes implementing a highly secure cryptography scheme using properties of quaternion Farey fractions. Quaternions were discovered in 1843 as a way to represent rotations in 3D space. Operations on quaternions like addition, multiplication, and division are described. The properties of quaternions like representations, conjugation, absolute value, and real/complex subspaces are also covered. The objective is to develop a novel cryptography model using number theory and properties of quaternions to provide high security against attacks.
Abstract
In the infancy of Cryptography Mono-alphabetic Substitution Ciphers were considered good enough to baffle any potential attackers but with the advancements in technology & the upsurge of computing power those methods have become trivial. Even the very complex methods of encryption are vulnerable to the brute force attacks of contemporary computers and with Quantum computing on the horizon even the current state of the art cryptosystems are at risk. Lots of research is being done and every possible field is being explored in order to create that elusive unbreakable cipher. Among other subjects, Geometry is also being applied and various ciphers based on the properties of different geometrical figures have been developed. This paper ventures to investigate the recent research applying the concept of geometry to boost the caliber of pre-existing cryptosystems enhance the understanding of the subject.
Keywords: Cryptography, Geometry, Encryption, Decryption, ECC, Circle, Chakra, Ellipse, Hyperbola, HCCS
1. The document discusses matrices and their uses. It provides examples of matrices and defines them as rectangular arrangements of numbers, expressions, or symbols arranged in rows and columns.
2. Matrices have various real-world applications including surveys, population data, gross domestic products, robotics, graphics, message encoding, and dimensional works. They are used in tools like Google search algorithms and seismic mapping.
3. The history of matrices dates back to ancient times but the term was introduced in 1850. An important ancient Chinese text from 300 BC to 200 AD provides the first example of using matrices to solve simultaneous linear equations.
The document provides an overview of discrete mathematics and its applications. It begins by defining discrete mathematics as the study of mathematical structures that are discrete rather than continuous. Some key points made include:
- Discrete mathematics deals with objects that can only assume distinct, separated values. Fields like combinatorics, graph theory, and computation theory are considered parts of discrete mathematics.
- Research in discrete mathematics increased in the latter half of the 20th century due to the development of digital computers which operate using discrete bits.
- The document then gives several examples of applications of discrete mathematics, such as in computer science, networking, cryptography, logistics, and scheduling problems.
- Discrete mathematics is widely used in fields like
FIRST-ORDER MATHEMATICAL FUZZY LOGIC WITH HEDGES cscpconf
In this paper, we consider first-order mathematical fuzzy logic expanded by many hedges. This is based on the fact that, in the real world, many hedges can be used simultaneously, and some hedge modifies truth (or meaning of sentences) more than another hedge. Moreover, each hedge may or may not have a dual one. We expand two axiomatizations for propositional mathematical fuzzy logic with many hedges to the first-order level and prove a number of completeness results for the resulting logics. We also consider logics with many hedges based on -core fuzzy logics.
Graph Tea: Simulating Tool for Graph Theory & AlgorithmsIJMTST Journal
Simulation in teaching has recently entered the field of education. It is used at different levels of instruction.
The teacher is trained practically and also imparted theoretical learning. In Computer Science, Graph theory
is the fundamental mathematics required for better understanding Data Structures. To Teach Graph theory &
Algorithms, We introduced Simulation as an innovative teaching methodology. Students can understand in a
better manner by using simulation. Graph Tea is one of such simulation tool for Graph Theory & Algorithms.
In this paper, we simulated Tree Traversal Techniques like Breadth First Search (BFS), Depth First Search
(DFS) and minimal cost spanning tree algorithms like Prims.
Application of matrices in real life and matrixDarshDobariya
The document provides an overview of matrices, including:
- A brief history of matrices dating back to ancient times.
- Different types of matrices like row, column, null, square, diagonal, and more.
- Applications of matrices in fields like computer graphics, cryptography, wireless communication, robotics, and chemistry. Matrices are used to represent transformations, encode/decode messages, model wireless signals, program robot movements, and balance chemical equations.
- The document contains examples of matrix usage in graphics, cryptography, wireless communication, robotics, and chemistry.
Calculus is used in computer science and engineering in five main areas:
1. Creating graphs and visualizations, such as 3D models used in video games.
2. Solving problems through simulations and modeling physics engines.
3. Incorporating calculus formulas like derivatives and integrals into computer programs and code.
4. Working with binary arithmetic, the foundation of computing using only 1s and 0s.
5. Processing information through statistical analysis, probabilities, simulations, and analyzing algorithms.
ANALYSE AND IMPLEMENT OF CRYPTOGRAPHY WITH HIGH SECURITY USING QUATERNIONAM Publications,India
The document discusses cryptography using quaternion numbers. It analyzes implementing a highly secure cryptography scheme using properties of quaternion Farey fractions. Quaternions were discovered in 1843 as a way to represent rotations in 3D space. Operations on quaternions like addition, multiplication, and division are described. The properties of quaternions like representations, conjugation, absolute value, and real/complex subspaces are also covered. The objective is to develop a novel cryptography model using number theory and properties of quaternions to provide high security against attacks.
Abstract
In the infancy of Cryptography Mono-alphabetic Substitution Ciphers were considered good enough to baffle any potential attackers but with the advancements in technology & the upsurge of computing power those methods have become trivial. Even the very complex methods of encryption are vulnerable to the brute force attacks of contemporary computers and with Quantum computing on the horizon even the current state of the art cryptosystems are at risk. Lots of research is being done and every possible field is being explored in order to create that elusive unbreakable cipher. Among other subjects, Geometry is also being applied and various ciphers based on the properties of different geometrical figures have been developed. This paper ventures to investigate the recent research applying the concept of geometry to boost the caliber of pre-existing cryptosystems enhance the understanding of the subject.
Keywords: Cryptography, Geometry, Encryption, Decryption, ECC, Circle, Chakra, Ellipse, Hyperbola, HCCS
1. The document discusses matrices and their uses. It provides examples of matrices and defines them as rectangular arrangements of numbers, expressions, or symbols arranged in rows and columns.
2. Matrices have various real-world applications including surveys, population data, gross domestic products, robotics, graphics, message encoding, and dimensional works. They are used in tools like Google search algorithms and seismic mapping.
3. The history of matrices dates back to ancient times but the term was introduced in 1850. An important ancient Chinese text from 300 BC to 200 AD provides the first example of using matrices to solve simultaneous linear equations.
The document provides an overview of discrete mathematics and its applications. It begins by defining discrete mathematics as the study of mathematical structures that are discrete rather than continuous. Some key points made include:
- Discrete mathematics deals with objects that can only assume distinct, separated values. Fields like combinatorics, graph theory, and computation theory are considered parts of discrete mathematics.
- Research in discrete mathematics increased in the latter half of the 20th century due to the development of digital computers which operate using discrete bits.
- The document then gives several examples of applications of discrete mathematics, such as in computer science, networking, cryptography, logistics, and scheduling problems.
- Discrete mathematics is widely used in fields like
FIRST-ORDER MATHEMATICAL FUZZY LOGIC WITH HEDGES cscpconf
In this paper, we consider first-order mathematical fuzzy logic expanded by many hedges. This is based on the fact that, in the real world, many hedges can be used simultaneously, and some hedge modifies truth (or meaning of sentences) more than another hedge. Moreover, each hedge may or may not have a dual one. We expand two axiomatizations for propositional mathematical fuzzy logic with many hedges to the first-order level and prove a number of completeness results for the resulting logics. We also consider logics with many hedges based on -core fuzzy logics.
Graph Tea: Simulating Tool for Graph Theory & AlgorithmsIJMTST Journal
Simulation in teaching has recently entered the field of education. It is used at different levels of instruction.
The teacher is trained practically and also imparted theoretical learning. In Computer Science, Graph theory
is the fundamental mathematics required for better understanding Data Structures. To Teach Graph theory &
Algorithms, We introduced Simulation as an innovative teaching methodology. Students can understand in a
better manner by using simulation. Graph Tea is one of such simulation tool for Graph Theory & Algorithms.
In this paper, we simulated Tree Traversal Techniques like Breadth First Search (BFS), Depth First Search
(DFS) and minimal cost spanning tree algorithms like Prims.
Application of matrices in real life and matrixDarshDobariya
The document provides an overview of matrices, including:
- A brief history of matrices dating back to ancient times.
- Different types of matrices like row, column, null, square, diagonal, and more.
- Applications of matrices in fields like computer graphics, cryptography, wireless communication, robotics, and chemistry. Matrices are used to represent transformations, encode/decode messages, model wireless signals, program robot movements, and balance chemical equations.
- The document contains examples of matrix usage in graphics, cryptography, wireless communication, robotics, and chemistry.
Calculus is used in computer science and engineering in five main areas:
1. Creating graphs and visualizations, such as 3D models used in video games.
2. Solving problems through simulations and modeling physics engines.
3. Incorporating calculus formulas like derivatives and integrals into computer programs and code.
4. Working with binary arithmetic, the foundation of computing using only 1s and 0s.
5. Processing information through statistical analysis, probabilities, simulations, and analyzing algorithms.
The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process. The wrong determinant result cannot be used in the process because it produces the incorrect plaintext when doing the decryption after the encryption. Genetic algorithms offer the optimized way to determine the key used for encryption and decryption on the Hill Cipher. By determining the evaluation function in the genetic algorithm, the key that fits the composition will be obtained. By implementing this algorithm, the search of the key on the Hill Cipher will be easily done without spending too much time. Genetic algorithms do well if it is combined with Hill Cipher.
Matrices have various applications in real life. They are used in physics to study electrical circuits, quantum mechanics, and optics. Programmers also use matrices and inverse matrices for coding and encrypting messages. In dimensional work, matrices help project 3D images onto 2D screens to create realistic motions. Matrices are applied in economics to calculate GDP and efficiently measure goods production. They also help organizations like scientists record experiment data. Google search uses matrices in its page rank algorithm to rank search results.
Real life use of Discrete Mathematics and Digital electronics. Niloy Biswas
We made a presentation about where we use Discrete math and Digital electronics in our real life. It's real life application of Discrete math and Digital electronics.
The document outlines a proposed 8 semester curriculum for a Bachelor's degree in Machine Learning and Data Science. The curriculum covers fundamental topics in mathematics, computer science, statistics, physics and artificial intelligence in the first 4 semesters. Later semesters focus on more advanced topics in artificial intelligence, machine learning, neural networks, databases, and parallel programming. The final semester emphasizes practical applications of machine learning and data science through courses on large-scale systems and non-traditional databases.
The document discusses algorithms for mining frequent subgraphs from graph data. It begins by introducing graph mining and defining frequent subgraphs. The main algorithms are categorized into greedy search, inductive logic programming, and graph theory approaches. Graph theory approaches are further divided into Apriori-based and pattern growth algorithms. The algorithms are compared based on attributes like graph representation, search strategy, nature of input, and completeness of output. Key algorithms discussed include SUBDUE, AGM, and gSpan.
This document discusses matrices and their uses. It defines what a matrix is and provides examples of different types of matrices like row matrices, column matrices, null matrices, identity matrices, diagonal matrices, triangular matrices, and transpose matrices. It then discusses some applications of matrices like in cryptography for encrypting messages, in electrical circuits, quantum mechanics, optics, robotics, automation, economics, and more. Matrices are useful for tasks like plotting graphs, scientific studies, page ranking algorithms, image projection, representing real world data, and calculating gross domestic products.
Matrices are rectangular arrangements of numbers or expressions that are organized into rows and columns. They have many applications in fields like physics, computer science, mathematics, and engineering. Specifically, matrices are used to model electrical circuits, for image projection and page ranking algorithms, in matrix calculus, for encrypting messages, in seismic surveys, representing population data, calculating GDP, and programming robot movements. Matrices play a key role in solving problems across many domains through their representation of relationships between variables.
Quantum persistent k cores for community detectionColleen Farrelly
PPT overview of paper accepted for 2019 Southeastern International Conference on Combinatorics, Graph Theory & Computing. Details a persistence approach to community detection and a new quantum persistence-based algorithm based on the coloring problem.
Conditional Matching Preclusion Number of Certain Graphsijcoa
The document discusses the conditional matching preclusion number of certain graphs. It is defined as the minimum number of edges whose deletion results in a graph with no isolated vertices and has neither a perfect matching nor almost perfect matching. The paper finds the conditional matching preclusion number for triangular ladder, Cn with parallel chords, Trampoline Graph, diamond Snake Graph and K- Polygonal Snake Graph.
Design of advanced encryption standard using Vedic MathematicsAM Publications
This work describes about the designing of Advanced Encryption System suitable for areas requiring
maximal area minimization such as that for mobile phones. As the demand for secure transactions in banking and
such related areas is increasing, encryption and decryption using cryptography plays a very important role. Nowadays,
as majority of secure transactions occurs on smart phones and other handheld devices, an algorithm that consumes
less area and that without compromising with overall performance becomes a necessity. In order to meet this
requirement, several algorithms have been designed and implemented in the past, but each of these algorithms possess
their own shortcomings with respect to an ASIC or an FPGA implementation. The design is done using Verilog
hardware description language which provides an immediate hardware implementation possibility. The hardware
implementation of the system is faster when compared to the conventional designs. We utilize the techniques involved
in Vedic mathematics to realize the same. Comparisons are carried out with the conventional designs to state the
advantages of the proposed design.
What is matrix? Matrix in physics. Matrix in computer science. Matrix in encryption. Matrix in others sector. geology surveys,robot movement,scientific experiment.
This document provides a review of graph-based image classification and frequent subgraph mining algorithms. It first introduces graph-based image representation and the need for approximate subgraph matching to account for noise and distortions. It then surveys several existing frequent subgraph mining algorithms, including CSMiner, SUBDUE, gdFil, FSG, and PrefixSpan. These algorithms are categorized as Apriori-based approaches or pattern-growth approaches. The document also discusses applications of graph mining in other domains such as chemistry and biology.
This document discusses various approaches to text clustering, including K-means clustering, Gaussian mixture models, and matrix factorization. It notes some of the limitations and assumptions of these approaches, such as the need to specify the number of clusters for K-means and the assumption of Gaussian distributions. The document also discusses other approaches like hierarchical clustering and methods that can handle sparse data like text. The goal is to provide an overview of clustering techniques for text without advanced mathematics.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Resume of Masamichi Takagi on Jul 19, 2010masataka2
Masamichi Takagi is seeking a position in software research, hardware research, or product management. He has 6 years of experience in processor architecture, parallel processing, compilers, and communication middleware. His education includes a Ph.D. in Computer Science from the University of Tokyo and he has published papers on topics including parallelization, speculative multi-threading, and cache algorithms.
This document presents a method for detecting Devnagari text in scene images. The method uses two main characteristics of Devnagari text: uniform stroke width and the presence of a headline with vertical strokes below it. Candidate text regions are identified using distance transforms to verify uniform stroke width. A probabilistic Hough transform is then used to detect horizontal lines in each region, which are analyzed to identify headlines indicating Devnagari text. The method was tested on 10,000 images and achieved a precision of 0.7994 and recall of 0.778 for Devnagari text detection, representing an improvement over previous work. Some limitations are noted and future work is proposed to address them through machine learning approaches.
Numerical models for complex molecular systemskhinsen
The models used in molecular simulations have become complex to the point of "existing" only in software source code, which is hard to read, rarely reviewed and often not even published. This talk explores how and why we should pull the models out of the source code and put them back into scientific discourse.
Autoregressive Convolutional Neural Networks for Asynchronous Time SeriesGautier Marti
In this talk, we present a CNN architecture for predicting autoregressive asynchronous time series. We illustrate its application on predicting traders’ quotes of credit default swaps (proprietary dataset from Hellebore Capital), and on artificial time series. The paper is available there: http://proceedings.mlr.press/v80/binkowski18a/binkowski18a.pdf
APG Ltd. has implemented several asset management systems and knowledge sharing programs over the years to improve collaboration, reuse of intellectual capital, and business results. Their first initiative in 1994 involved capturing work and knowledge to enable reuse and more efficient delivery of client solutions. Current systems include Knowledge View for their consulting business, capturing millions of assets and saving over $40 million in 2004. Their Worldwide Asset Reuse program has captured over $81 million in cost savings and $63 million in additional revenue from asset sharing. Xtreme Leverage implemented for software brands consolidated expertise location and communities, reducing expert search time from a week to under eight hours and generating over $50 million in annual productivity improvements.
The Commonwealth of Nations is a free association of sovereign states comprising the UK and some of its former dependencies who maintain ties and acknowledge the British monarch. Some Commonwealth nations include the UK, Canada, Australia, New Zealand, South Africa, India, Pakistan, Sri Lanka, Malaysia, Nigeria and Cyprus. Sri Lanka is an island nation located in the Indian Ocean between latitudes 5°55′ and 9°51′ N and longitudes 79°41′ and 81°53′ E. It has a maximum length of 268 miles and width of 139 miles. Sri Lanka has a diverse culture with Buddhist, Hindu, Muslim and Christian influences seen in its temples, mosques and churches. The British were initially attracted to Sri Lanka due to
The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process. The wrong determinant result cannot be used in the process because it produces the incorrect plaintext when doing the decryption after the encryption. Genetic algorithms offer the optimized way to determine the key used for encryption and decryption on the Hill Cipher. By determining the evaluation function in the genetic algorithm, the key that fits the composition will be obtained. By implementing this algorithm, the search of the key on the Hill Cipher will be easily done without spending too much time. Genetic algorithms do well if it is combined with Hill Cipher.
Matrices have various applications in real life. They are used in physics to study electrical circuits, quantum mechanics, and optics. Programmers also use matrices and inverse matrices for coding and encrypting messages. In dimensional work, matrices help project 3D images onto 2D screens to create realistic motions. Matrices are applied in economics to calculate GDP and efficiently measure goods production. They also help organizations like scientists record experiment data. Google search uses matrices in its page rank algorithm to rank search results.
Real life use of Discrete Mathematics and Digital electronics. Niloy Biswas
We made a presentation about where we use Discrete math and Digital electronics in our real life. It's real life application of Discrete math and Digital electronics.
The document outlines a proposed 8 semester curriculum for a Bachelor's degree in Machine Learning and Data Science. The curriculum covers fundamental topics in mathematics, computer science, statistics, physics and artificial intelligence in the first 4 semesters. Later semesters focus on more advanced topics in artificial intelligence, machine learning, neural networks, databases, and parallel programming. The final semester emphasizes practical applications of machine learning and data science through courses on large-scale systems and non-traditional databases.
The document discusses algorithms for mining frequent subgraphs from graph data. It begins by introducing graph mining and defining frequent subgraphs. The main algorithms are categorized into greedy search, inductive logic programming, and graph theory approaches. Graph theory approaches are further divided into Apriori-based and pattern growth algorithms. The algorithms are compared based on attributes like graph representation, search strategy, nature of input, and completeness of output. Key algorithms discussed include SUBDUE, AGM, and gSpan.
This document discusses matrices and their uses. It defines what a matrix is and provides examples of different types of matrices like row matrices, column matrices, null matrices, identity matrices, diagonal matrices, triangular matrices, and transpose matrices. It then discusses some applications of matrices like in cryptography for encrypting messages, in electrical circuits, quantum mechanics, optics, robotics, automation, economics, and more. Matrices are useful for tasks like plotting graphs, scientific studies, page ranking algorithms, image projection, representing real world data, and calculating gross domestic products.
Matrices are rectangular arrangements of numbers or expressions that are organized into rows and columns. They have many applications in fields like physics, computer science, mathematics, and engineering. Specifically, matrices are used to model electrical circuits, for image projection and page ranking algorithms, in matrix calculus, for encrypting messages, in seismic surveys, representing population data, calculating GDP, and programming robot movements. Matrices play a key role in solving problems across many domains through their representation of relationships between variables.
Quantum persistent k cores for community detectionColleen Farrelly
PPT overview of paper accepted for 2019 Southeastern International Conference on Combinatorics, Graph Theory & Computing. Details a persistence approach to community detection and a new quantum persistence-based algorithm based on the coloring problem.
Conditional Matching Preclusion Number of Certain Graphsijcoa
The document discusses the conditional matching preclusion number of certain graphs. It is defined as the minimum number of edges whose deletion results in a graph with no isolated vertices and has neither a perfect matching nor almost perfect matching. The paper finds the conditional matching preclusion number for triangular ladder, Cn with parallel chords, Trampoline Graph, diamond Snake Graph and K- Polygonal Snake Graph.
Design of advanced encryption standard using Vedic MathematicsAM Publications
This work describes about the designing of Advanced Encryption System suitable for areas requiring
maximal area minimization such as that for mobile phones. As the demand for secure transactions in banking and
such related areas is increasing, encryption and decryption using cryptography plays a very important role. Nowadays,
as majority of secure transactions occurs on smart phones and other handheld devices, an algorithm that consumes
less area and that without compromising with overall performance becomes a necessity. In order to meet this
requirement, several algorithms have been designed and implemented in the past, but each of these algorithms possess
their own shortcomings with respect to an ASIC or an FPGA implementation. The design is done using Verilog
hardware description language which provides an immediate hardware implementation possibility. The hardware
implementation of the system is faster when compared to the conventional designs. We utilize the techniques involved
in Vedic mathematics to realize the same. Comparisons are carried out with the conventional designs to state the
advantages of the proposed design.
What is matrix? Matrix in physics. Matrix in computer science. Matrix in encryption. Matrix in others sector. geology surveys,robot movement,scientific experiment.
This document provides a review of graph-based image classification and frequent subgraph mining algorithms. It first introduces graph-based image representation and the need for approximate subgraph matching to account for noise and distortions. It then surveys several existing frequent subgraph mining algorithms, including CSMiner, SUBDUE, gdFil, FSG, and PrefixSpan. These algorithms are categorized as Apriori-based approaches or pattern-growth approaches. The document also discusses applications of graph mining in other domains such as chemistry and biology.
This document discusses various approaches to text clustering, including K-means clustering, Gaussian mixture models, and matrix factorization. It notes some of the limitations and assumptions of these approaches, such as the need to specify the number of clusters for K-means and the assumption of Gaussian distributions. The document also discusses other approaches like hierarchical clustering and methods that can handle sparse data like text. The goal is to provide an overview of clustering techniques for text without advanced mathematics.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Resume of Masamichi Takagi on Jul 19, 2010masataka2
Masamichi Takagi is seeking a position in software research, hardware research, or product management. He has 6 years of experience in processor architecture, parallel processing, compilers, and communication middleware. His education includes a Ph.D. in Computer Science from the University of Tokyo and he has published papers on topics including parallelization, speculative multi-threading, and cache algorithms.
This document presents a method for detecting Devnagari text in scene images. The method uses two main characteristics of Devnagari text: uniform stroke width and the presence of a headline with vertical strokes below it. Candidate text regions are identified using distance transforms to verify uniform stroke width. A probabilistic Hough transform is then used to detect horizontal lines in each region, which are analyzed to identify headlines indicating Devnagari text. The method was tested on 10,000 images and achieved a precision of 0.7994 and recall of 0.778 for Devnagari text detection, representing an improvement over previous work. Some limitations are noted and future work is proposed to address them through machine learning approaches.
Numerical models for complex molecular systemskhinsen
The models used in molecular simulations have become complex to the point of "existing" only in software source code, which is hard to read, rarely reviewed and often not even published. This talk explores how and why we should pull the models out of the source code and put them back into scientific discourse.
Autoregressive Convolutional Neural Networks for Asynchronous Time SeriesGautier Marti
In this talk, we present a CNN architecture for predicting autoregressive asynchronous time series. We illustrate its application on predicting traders’ quotes of credit default swaps (proprietary dataset from Hellebore Capital), and on artificial time series. The paper is available there: http://proceedings.mlr.press/v80/binkowski18a/binkowski18a.pdf
APG Ltd. has implemented several asset management systems and knowledge sharing programs over the years to improve collaboration, reuse of intellectual capital, and business results. Their first initiative in 1994 involved capturing work and knowledge to enable reuse and more efficient delivery of client solutions. Current systems include Knowledge View for their consulting business, capturing millions of assets and saving over $40 million in 2004. Their Worldwide Asset Reuse program has captured over $81 million in cost savings and $63 million in additional revenue from asset sharing. Xtreme Leverage implemented for software brands consolidated expertise location and communities, reducing expert search time from a week to under eight hours and generating over $50 million in annual productivity improvements.
The Commonwealth of Nations is a free association of sovereign states comprising the UK and some of its former dependencies who maintain ties and acknowledge the British monarch. Some Commonwealth nations include the UK, Canada, Australia, New Zealand, South Africa, India, Pakistan, Sri Lanka, Malaysia, Nigeria and Cyprus. Sri Lanka is an island nation located in the Indian Ocean between latitudes 5°55′ and 9°51′ N and longitudes 79°41′ and 81°53′ E. It has a maximum length of 268 miles and width of 139 miles. Sri Lanka has a diverse culture with Buddhist, Hindu, Muslim and Christian influences seen in its temples, mosques and churches. The British were initially attracted to Sri Lanka due to
Este documento discute cómo las empresas pueden crear lealtad a largo plazo entre los clientes. Explica que las empresas modernas se centran en satisfacer las necesidades de los clientes para que estos elijan sus productos de manera consistente en lugar de por casualidad. También describe algunas estrategias como medir la satisfacción del cliente, maximizar el valor que aporta cada cliente a lo largo del tiempo y asegurar que cada cliente sea rentable para la empresa. El objetivo general es entender mejor a los clientes y retenerlos a través de una excelente atención
The document provides a summary of Vishal S. Telkar's professional experience and qualifications. It summarizes that he has over 10 years of experience in business development for retail companies like Devyani International Ltd., Dominos Pizza, and Property Shoppe India. It also lists his educational qualifications which include a BMM degree from Mumbai University.
This document discusses common problems with conventional customer loyalty programs and provides suggestions for rethinking loyalty programs. It questions whether current programs are effectively increasing customer loyalty and return visits. The document advocates designing loyalty programs that are personalized using customer data and preferences across multiple channels like mobile, email, and social media. Loyalty programs should reward customers for engaging with the brand through reviews, surveys, and social sharing in order to strengthen relationships.
This document is a license agreement for Microsoft Windows 8.1 Pro software. It outlines the terms of use for the software, including that the user is granted a license to install the software on one computer for use by one person at a time. The software is not licensed for server or commercial hosting use. The agreement also covers transferring the software to another user or computer, internet activation of the software, data collection and privacy practices, limitations on certain uses of the software, and additional terms for multi-user scenarios and virtualization.
The number theory is a branch of mathematics which is primarily dedicated to the
study of integers. The number theory, as such, is less applied in engineering compared to
calculus, geometry, etc. The problem was that it could not be used directly in any
application. But, the number theory, combined with the computational power of modern
computers, gives interesting solutions to real-life problems. It has many uses in various
fields such as cryptography, computing, numerical analysis and so on. Here, we focus on
the applications of the number theory about engineering challenges.
Creation of smart spaces and scaling of devices to achieve miniaturization in pervasive computing environments has put forth a question on the degree of security of such devices. Security being a unique challenge in such environments, solution demands scalability, access control, heterogeneity, trust. Most of the existing cryptographic solutions widely in use rely on the hardness of factorization and number theory
problems. With the increase in cryptanalytic attacks these schemes will soon become insecure. We need an alternate security mechanism which is as hard as the existing number theoretic approaches. In this work, we discuss the aspects of Lattice based cryptography as a new dimension of providing security whose strength lies in the hardness of lattice problems. We discuss about a cryptosystem whose security relies on high lattice dimension.
Survey: Elliptic Curve Cryptography using Scalar Multiplication AlgorithmsAM Publications
This document summarizes an article from the International Journal of Innovative Research in Advanced Engineering that discusses elliptic curve cryptography and scalar multiplication algorithms. It begins with an introduction to elliptic curve cryptography and some of its applications. It then provides mathematical background on elliptic curves and discusses elliptic curve digital signature algorithm, elliptic curve Diffie-Hellman, and elliptic curve integrated encryption scheme. The document focuses on various algorithms for elliptic curve scalar multiplication, including non-adjacent form representation, and compares their features to determine the most efficient algorithm.
This document presents a proposed algorithm for public key cryptography using matrices. The algorithm has three stages: 1) shuffling the original data using a linear congruential method and arranging it in a matrix, 2) traversing the data matrix in different patterns, and 3) generating a system of non-homogeneous linear equations from the matrix to derive private keys. The algorithm aims to provide data confidentiality, integrity and authentication for cloud computing applications using public key cryptography with matrices in a way that has constant complexity regardless of key size.
A tutorial on secure outsourcing of large scalecomputation for big dataredpel dot com
A tutorial on secure outsourcing of large scalecomputation for big data
for more ieee paper / full abstract / implementation , just visit www.redpel.com
This paper presents an Applying new Genetic approach, which is Volvox reproduction(VR) algorithm using the natural concept. Then design a hybrid technique(HVR), in order to generated a wide colony of positive integer numbers, which used to encryption(decryption) of English text with different sizes. This suggested using shifting of places of letters.
Where the HVR process was built using Matlab, which attend 100% success.
With the surge in modern research focus towards Pervasive Computing, lot of techniques and challenges
needs to be addressed so as to effectively create smart spaces and achieve miniaturization. In the process of
scaling down to compact devices, the real things to ponder upon are the Information Retrieval challenges.
In this work, we discuss the aspects of multimedia which makes information access challenging. An
Example Pattern Recognition scenario is presented and the mathematical techniques that can be used to
model uncertainty are also presented for developing a system that can sense, compute and communicate in
a way that can make human life easy with smart objects assisting from around his surroundings.
Chaotic systems with pseudorandom number generate to protect the transmitted...nooriasukmaningtyas
Communication techniques have witnessed rapid development in recent years, especially the internet and the mobile network, which led to rapid data transmission. The latest developments, in turn, have come out with advanced decisions to secure information from eavesdropping. Myriad in-depth studies in cryptography. It was implemented with the intention of proposing a revolutionary solution to protect data by encryption techniques, tend maps, and logistics. This work had proposed a new design to the generator of pseudo-random numbers (GPRN) which had utilized multi chaotic systems. Synchronization of Multi-parameters chaotic arises in many applications, in natural or industrial systems. Many methods have been introduced for using a chaotic system in the encryption of data. Analysis of security of chaotic system had been executed on key sensitivity and key space.
The document summarizes the discussions and outcomes of a Dagstuhl Perspectives Workshop on applying tensor computing methods to problems in the Internet of Things (IoT). At the workshop, researchers from both industry and academia presented on challenges involving analyzing large, multi-dimensional streaming data from IoT devices and cyber-physical systems. Tensors provide a natural way to represent such data and can enable more efficient information extraction than alternative methods. However, further work is needed to develop benchmark challenges, datasets, and frameworks to make tensor methods more accessible and applicable to industrial IoT problems. The group discussed forming a knowledge hub and collaborating on data challenges to help establish tensor computing as a solution for machine learning on cyber-physical systems.
Securing sensitive and important information from intruders is a tedious task in the 21st century. In order to protect information different ciphering techniques has been used. Quantum Cryptography has taken a new path in the field of crypto systems where all the presently used crypto systems are classified as classical cryptography systems. Classical cryptography systems use mathematical formulas where quantum cryptography uses the principles of photon polarization and heisenberg uncertainty principle. As the south
asian region is developing rapidly in almost all the sectorsthe need of securing information has become a difficult task. Therefore, the need of starting extensive research on quantum cryptography for the south asian region to safeguard information from intruders has been the purpose of this study. Comparative study of the growth of the telecommunication sector in the south asian region and how quantum
cryptography could assist in securing information has been discussedas results.In the end, details of the need to research on quantum cryptography in the south asian region to overcome future predicted cyber threats are also discussed.
Fingerprints are imprints formed by friction
ridges of the skin and thumbs. They have long been used for
identification because of their immutability and individuality.
Immutability refers to the permanent and unchanging character
of the pattern on each finger. Individuality refers to the
uniqueness of ridge details across individuals; the probability
that two fingerprints are alike is about 1 in 1.9x1015. In despite of
this improvement which is adopted by the Federal Bureau of
Investigation (FBI), the fact still is “The larger the fingerprint
files became, the harder it was to identify somebody from their
fingerprints alone. Moreover, the fingerprint requires one of the
largest data templates in the biometric field”. The finger data
template can range anywhere from several hundred bytes to over
1,000 bytes depending upon the level of security that is required
and the method that is used to scan one's fingerprint. For these
reasons this work is motivated to present another way to tackle
the problem that is relies on the properties of Vector
Quantization coding algorithm.
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...Editor IJCATR
Now a day’s Cryptography is one of the broad areas for researchers. Due to its importance, several cryptography techniques
are adopted by many authors to secure the data, but still there is a scope to improve the previous approaches. The main of our research
is to develop a novel Approach for enhancing the security of Amazigh Text using binary tree. The plaintext considered is the
combination of Unicode characters. This paper contributes in the area of elliptic curve cryptography by encrypting data using matrix
approach and using the concept of tree traversal method for enhancing the security of the encrypted points. The security goals were
enhanced by making it difficult for attacker to predicate a pattern as well as speed of the encryption/decryption scheme. The results
show strength of the algorithm.
Implementation and Secured Authentication Key using Elliptic Curve CryptographyAM Publications,India
The Elliptic Curve Cryptosystem (ECC) is an emerging alternative for traditional public key cryptosystem like RSA, DSA and Diffie-Hellman. It provides the highest strength- per-bit of any Cryptosystem known today with smaller key sizes resulting in faster computation and memory. Diffie – Hellman key exchange the protocol based on Elliptic curve cryptography. ECC techniques such as RSA is that the best known algorithm for solving ECDL the underlying hard mathematical in Scalar multiplication problem in ECC.
This document provides an overview of techniques for temporal data mining. It discusses how temporal sequences arise in domains like engineering, science, finance, and healthcare. It covers approaches for representing temporal sequences, including keeping data in its original form, piecewise approximations, transformations to other domains, discretization, and generative models. It also discusses measuring similarity between sequences and techniques for classification and relation finding in temporal data, including frequent pattern detection and prediction. The goal is to classify and organize temporal data mining techniques to help practitioners address problems involving temporal data.
International journal of engineering issues vol 2015 - no 2 - paper4sophiabelthome
This document discusses modeling cyber-physical systems for engineering complex software. It proposes using geometric algebra and grammar of graphics to provide better visualization of cyber-physical systems. The key points are:
1) Cyber-physical systems integrate computation, networking, and physical processes. They are complex software systems that connect various sub-systems.
2) Geometric algebra and grammar of graphics can provide a mathematical approach to model the dynamics of cyber-physical systems. This allows better visualization of interconnected elements, feedback processes, and emergent behaviors.
3) Geometric algebra represents geometric objects algebraically rather than through equations. This provides a unified language for engineering disciplines and aspects of computer science like graphics.
International journal of engineering issues vol 2015 - no 1 - paper3sophiabelthome
This document summarizes a paper on modeling evolving complex software systems as cyber-physical systems using principles from physics and mathematics. It discusses how software systems can be viewed as complex automatons with mathematical foundations in areas like complex numbers and Fourier transforms. Cybernetics provides tools to model human behaviors and interactions in these systems. The paper also discusses how analog computers were early models of physical phenomena, and how infinitesimals and differentials from calculus can model continuously changing aspects of cyber-physical systems, within the limits imposed by physical reality.
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsAM Publications
A large share of embedded applications are wireless, which makes the communication channel especially vulnerable. The research in the field of ECC is mostly focused on its implementation on application specific systems, which have restricted resources like storage, processing speed and domain specific CPU architecture. The focus of this research is on the implementation of ECC in an embedded iOS application to compare the performance measures obtained in the wireless environment or embedded systems by using elliptic curve cryptography (ECC), with a traditional cryptosystem like RSA.
The document discusses mining frequent items and item sets from data streams using fuzzy approaches. It describes objectives of mining frequent items from datasets in real-time using fuzzy sets and slices. This involves fetching relevant records, analyzing the data, searching for liked items using fuzzy slices, identifying frequently viewed item lists, making recommendations, and evaluating the results. Algorithms used for mining frequent items from data streams in a single or multiple pass are also reviewed.
call for papers, research paper publishing, where to publish research paper, journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJEI, call for papers 2012,journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, research and review articles, engineering journal, International Journal of Engineering Inventions, hard copy of journal, hard copy of certificates, journal of engineering, online Submission, where to publish research paper, journal publishing, international journal, publishing a paper, hard copy journal, engineering journal
This document discusses several applications of graph theory in different domains. It provides examples of how graph theory can be used to model problems in computer science, chemistry, biology and other fields. Specifically, it discusses how graph theory is applied to find shortest paths in networks, model computer and cellular networks, represent molecular and crystal structures in chemistry, and model gene regulatory, metabolic and protein-protein interaction networks in biology. Many practical problems across diverse domains can be represented and solved using the mathematical abstractions of graph theory.
Similar to Numeral Structure Base Cryptography Design to Secure Distribution of Internet Assets (20)
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
Toddler family cadre is a community members work voluntarily in fostering and providing information to parents of toddlers about how to properly care for children. Toddler Family cadre desperately need training to increase their skills. There are still a few Toddler family cadres who get training so that the knowledge and skills of parents and other family members in developing toddlers' growth through physical stimulation, motoric intelligence, emotional and social economy as well as possible are still lacking. The purpose of this study is to develop an Android- assisted Toddler family cadre training model in Demak. This research is research in tian research and development. The research location was in Demak Regency. Toddler family cadres became the object of this research. Development of Toddler family cadre training models assisted by Android in Demak is feasible to be used as an effort to improve Toddler Family cadres' capabilities.
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
In recent years the use of composite materials in structural components has become increasingly common in a wide range of engineering applications. Composite materials offer numerous advantages over more conventional materials because of their superior specific properties, but a serious obstacle to a more widespread use of these materials is their high sensitivity to localized impact loading. This paper presents an experimental study to assess the impact response of drop weight impact tests on fiber reinforced polymer composites with deferent load and damage identification of composite using Non-destructive testing techniques ultrasonic testing (UT) C scan. In the study includes checking the strength of the specimen, plotting of graphs between the height and the impact energy obtained and tabulating the results after conducting the various functional tests.
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
In this paper I will present the use of fractal geometry to design tile motifs. A fractal is a geometric figure that combines the several characteristics among others: its parts have the same form as the whole, fragmented, and formation by iteration. The concept of fractals has been spread over all fields of sciences, technology, and art. This paper aims to provide an algorithm to creating motifs of tile algorithm for create the tile motif consists of base, iteration, coloration and duplication. In order to help the reader better understand the algorithm, I will present some script using Matlab. We describe a mathematically based algorithm that can fill a spatial region with sequence of randomly placed which may be transformed copies of one motif or several motifs. By using this algorithm, I can produce thousand variety of aesthetically pleasing tile motifs, of which we show a number of examples.
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
Two-dimensional resistivity analysis of magnetotelluric data has been done at “Z” geothermal area which is located in southern part of Indonesia. The objective is to understand subsurface structure beneath reasearch area based on 2-D modeling of magnetotelluric data. The inversion finite element method were used for numerical simulations which requires discretization on the boundary of the modeling domain. The modeling results of magnetotelluric data shows relativity structure dissemination: 0-10 ohm.m in a thickness of 1 km (Clay Cap), 10-100 ohm.m with 1-2 km depth respectively (reservoir zone), and on a scale of 100-1000 ohm.m in a depth of 2-3 km (heat source zone). The result of relativity structure can be used to delineate an area with geothermal prospect around 12 km2.
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
This document presents an optimization of laser welding parameters for martensitic stainless steel using a genetic algorithm. The algorithm aims to minimize the difference between the actual and desired weld size (width and depth) by optimizing laser power, welding speed, and fiber diameter. The genetic algorithm was run 10 times with a population of 30 over 200 iterations each time. The results showed errors between optimized and experimental values of less than 5% for the parameters. The study demonstrates that genetic algorithms can effectively optimize laser welding parameters to achieve a preset weld size.
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
The Ministry of Cooperatives and Small and Medium Enterprises launched in 2018 the number of Micro, Small and Medium Enterprises (MSMEs) in Indonesia as many as 58.97 million people. It is predicted that the number of MSMEs players in 2019 will amount to 59.2 million. This shows that the Indonesian people have made changes in the field of family economics which initially as consumptive are now productive. The community prefers to carry out activities that can increase family income. Future MSMEs remain the mainstay of the national economy. In accordance with the government roadmap, in 2020 e-commerce transactions are predicted to reach Rp1,300 trillion or equivalent to USD130 billion. According to data from the Central Statistics Agency (BPS), the contribution of MSMEs to Indonesia's Gross Domestic Product (GDP) reached 61.41%, with the number of MSMEs reaching almost 60 million units. However, only around 8% or 3.79 million of the 59.2 million MSMEs players have used online platforms to market their products. Based on the above problems, researchers conducted research on the analysis and display of E-Marketplace for MSMEs in Indonesia. The type of research used is action research. The object of research is MSMEs which are under the Office of Industry and Trade of Sragen Regency. The method of data collection is by techniques: (1) interview, (2) documentation (3) observation, (4) literature study. The researcher uses the waterfall method in developing the system. The research team has successfully analyzed the E-Market place according to the results of data collection. The research team has succeeded in designing the E-Marketplace for MSMEs. E-Marketplace designed can be used by admin, MSME and user. Admin is in charge of managing E-Marketplace and has full access rights. MSMEs can register online and manage their products in E-Marketplace. Users or buyers can search data in E-Marketplace as desired. To make transactions, users can interact directly with MSMEs according to the data provided in E-Marketplace. E-Marketplace can be used for marketing together MSMEs products. This e-marketplace can be accessed at www.umkmonline.com
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
Remote sensing technology's increasing accessibility helps us observe research and learn about our globe in ways we could only imagine a generation ago. Guides to profound knowledge of historical, conceptual and practical uses of remote sensing which is increasing GIS technology. This paper will go briefly through remote sensing benefits, history, technology and the GIS and remote sensing integration and their applications. Remote sensing (RS) is used in mapping the predicted and actual species and dominates the ecosystem canopy.
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
Currently, the finite element method (FEM) is still one of the useful tools in numerical simulation for technical problems. With this method, a continuum model presented by a certain number of elements with a simple approximation field causes the presence of discretization error in solutions. This paper considers the butt weld by laser which subjected the tension for AISI 1018 steel highness 8 mm. The aim of the study is to use the h-refinement of the FEM in estimation the strain energy error for the laser weld mentioned. The results show that the stability of the h-refinement shown by the value of the relative error of the strain energy is quite small, specifically; FEM is less than 5.7% and extra is no more than 3.7%.
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
Speech recognition is always being an all-time trendy topic for discussion and also for researches and we see a major application in our life. This paper provides the work done on the application of Hidden Markov model to implement isolated word speech recognition on MATLAB and to develop and train the system for set of self-selective words for specific user (user dependent) to get maximum efficiency in word recognition system. Which uses the forward and Baum-welch algorithm and fitting Gaussian of the Baum-welch algorithm for all the iteration perform. We use a sample of 7 alphabets which are recorded in 15 different ways giving total of 105 word to use for training with each word with 15 variations. This system can be used in real world in system security using voice security system and mainly for children and impaired people.
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
Detecting pedestrians in low resolution videos is a challenging task, due to the small size of pedestrians in the images and the limited information. In practical outdoor surveillance scenarios the pedestrian size is usually small. Existing state-of-the-art pedestrian detection methods that use histogram of oriented gradient (HOG) features have poor performance in this problem domain. To compensate for the lack of information in a single frame, we propose a novel detection method that recognizes pedestrians in a short sequence of frames. Namely, we take the single-frame HOG-based detector and extend it to multiple frames. Our detector is applied to regions containing potential moving objects. In the case of video taken from a moving camera on an aerial platform, video stabilization is first performed to register the frames. A classifier is then applied to features extracted from spatio-temporal volumes surrounding the potential moving objects. On challenging stationary and aerial video datasets, our detection accuracy outperforms several state-of-the-art algorithms.
The aim of this paper is to help the blind people to identify and catch the public transport vehicles with the help of Light Fidelity technology. It is a Navigation aid. When the bus arrives at the bus stand, transmitter in the bus transmits the light signals and receiver in the stick, receives the light signals and a sound signal is generated through the speaker present in the stick. The sound message contains the bus number and the destination of the bus. In addition to this, if the person is absconded or lost, details of the location will be sent to his/her family members by pressing a button. This is made possible with the help of Global System for Mobile (GSM). Finally, presence of water can be detected along the blind person’s path, with the help of water sensors.
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
A digital radiography delivers a radiation dose to patients; therefore it poses potential risk to the patients. One effort to reduce dose is carried out using a radiation filter, e.g. Silicone Rubber (SR) sheet. The purpose of this research was to determine the impact of the SR sheet on the high contrast objects (HCO) and the low contrast objects (LCO). The dose reduction was determined from attenuation x-rays before and after using the SR sheet. Assessment of HCO and LCO was observed from CDR TOR phantom at tube voltage of 48 kVp and tube current of 8 mAs. The physical parameter to assess image quality was the Signal to Noise Ratio (SNR) value in LCO. The maximum x-ray attenuation using the SR sheet is 48.82%. The visibility of the HCO remains the same, namely 16 objects; however the LCO slighly decreases from 14 objects to 13 objects after using the SR sheet. The SNR value decreases with an average value of 15.17%.Therefore, the SR sheet as a alternative filter has no effect on the HCO and has realtively little effect on the LCO. Thus, the SR sheet potentially is used for radiation protection in patients, especially on examinations that do not require low contrast resolution.
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
Immunization is the key strategy to curb communicable diseases which are the number one killer of children under five. Immunization prevents mortalities of approximating three million children under five annually. This study aimed to assess utilization of immunization services among children under five of age in Kirinyaga County, Kenya.
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
The article presents the study of cryptographic transformations of the Kuznyechik algorithm in relation to differential analysis and the translation of their representations into a more convenient form for cryptanalysis. A simplification of the type of transformations of the algorithm to algebraic the form, in which cryptanalysis software will be more effective. Since the description of the algorithm in the analytical form allows for 16 cycles of execution of the shift register with linear feedback, each of which will be carried out 16 operations of multiplication and 15 operations of addition, reduced to 16 multiplying and 15 the operations of addition. The result is an algebraic form of a linear transformation (from a shift register with linear feedback to the multiplication of the matrix in a finite field). In the future, the algebraic type of transformation can be used to effectively carry out differential cryptanalysis.
Optical character recognition (OCR) is process of classification of optical patterns contained in a digital image. The process of OCR Recognition involves several steps including pre-processing, segmentation, feature extraction, classification. Pre-processing is for done the basic operation on input image like noise reduction which remove the noisy signal from image. Segmentation stage for segment the given image into line by line and segment each character from segmented line. Future extraction calculates the characteristics of character. A Radial Basis Function Neural Network (RBFNN) is used to classification contains the database and does the comparison.
Surveillance refers to the task of observing a scene, often for lengthy periods in search of particular objects or particular behaviour. This task has many applications, foremost among them is security (monitoring for undesirable behaviour such as theft or vandalism), but increasing numbers of others in areas such as agriculture also exist. Historically, closed circuit TV (CCTV) surveillance has been mundane and labour Intensive, involving personnel scanning multiple screens, but the advent of reasonably priced fast hardware means that automatic surveillance is becoming a realistic task to attempt in real time. Several attempts at this are underway.
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
Interest in air pollution investigation of urban environment due to existence of industrial and commercial activities along with vehicular emission and existence of buildings and streets which setup natural barrier for pollutant dispersion in the urban environment has increased. The air pollution modelling is a multidisciplinary subject when the entire cities are taken under consideration where urban planning and geometries are complex which needs a large software packages to be developed like Operational Street Pollution Model (OSPM), California Line Source model (CALINE series) etc. On overviewing various works it can be summarized that the air pollutant dispersion in urban street canyons and all linked phenomenon such as wind flow, pollutant concentrations, temperature distribution etc. generally depend on wind speed and direction, building heights and density, road width, source and intensity of air pollution, meteorological variables like temperature, humidity etc. A unique and surprising case is observed every time on numerous combinations of these factors. The main aim of this study is to simulate the atmospheric pollutant dispersion for given pollutant like carbon monoxide, sulphur dioxide and nitrogen dioxide and given atmospheric conditions like wind speed and direction. Computational Fluid Dynamics (CFD) simulation for analysing the atmospheric pollutant dispersion is done after natural airflow analysis. Volume rendering is done for variables such as phase 2 volume fraction and velocity with resolution as 250 pixels per inch and transparency as 20%. It can be observed that all the three pollutant namely nitrogen dioxide, sulphur dioxide and carbon monoxide the phase 2 volume fraction changes from 0 to 1. The wind velocity changes from 3.395×10-13 m/s to 1.692×102 m/s. The dispersion of pollutants follow the sequence Sulphur dioxide>Carbon monoxide>Nitrogen dioxide.
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
In this article, we have extracted keratin from deccani wool waste and prepared the wool keratin based Chitosan nanofibers by electrospinning technique. The prepared nanofibers mat were prepared with different weight percent ratio like 1wt.%, 3wt.% and 5wt.% with respect to polymer i.e Chitosan. The physicochemical and filtration properties of wool keratin based Chitosan nanofibers were studied. Wool keratin based Chitosan nanofibers were characterized by Fourier transform infrared spectroscopy (FTIR), X-ray diffraction (XRD), differential scanning calorimetry (DSC) and scanning electron microscopy (FESEM). The filtration efficiency of keratin Chitosan nanofibers were investigated through DOP test and heavy metal removal capacity of evaluated through Atomic absorption spectroscopy. FTIR results were showed that Keratin gets compatible with Chitosan. XRD patterns revealed keratin was in crystalline nature and increase the crystalline nature of Chitosan nanofibers. FESEM images showed that uniform nanofibers generation with average fiber diameter 80nm. Nanofibers filtration efficiency against a particulate matter in air was obtained more than 99.53% and excellent property of removal of heavy metal.
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. The elements involved in cloud computing are clients, data center and distributed server. One of the main problems in cloud computing is load balancing. Balancing the load means to distribute the workload among several nodes evenly so that no single node will be overloaded. Load can be of any type that is it can be CPU load, memory capacity or network load. In this paper we presented an architecture of load balancing and algorithm which will further improve the load balancing problem by minimizing the response time. In this paper, we have proposed the enhanced version of existing regulated load balancing approach for cloud computing by comping the Randomization and greedy load balancing algorithm. To check the performance of proposed approach, we have used the cloud analyst simulator (Cloud Analyst). Through simulation analysis, it has been found that proposed improved version of regulated load balancing approach has shown better performance in terms of cost, response time and data processing time.
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
This paper presents various security features and configurations commonly implemented in WLANs and their aggregated security levels and then proposes a model that enables implementation and evaluation of WLAN security
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024