Design and development of asterisk based computer services accessing framewor...ijcsity
We are today living in ag
e where technology continues to bring about one magical transformation after
another into our lives. Especially computers and internet that constitute the cardinal components of the
present day technology have so penetrated into our live that they today ma
ke up an indispensable part of
life. In this paper, we present an Asterisk based framework that is designed particularly to the benefit of the
visually challenged people. These people find it difficult to use the conventional computer access devices
like t
he keyboard, the mouse or the monitor as these devices require a good hand
-
eye co
-
ordination. Our
framework is designed to take DTMF input from the user that serve as commands for execution of different
operations on the computer and provide output in the
form of voice using speech synthesis. Additionally,
our framework provides the benefit of customizing it as per user needs as it is based on the open source
platform Asterisk.
Este presente trabajo realizado durante la capacitación virtual docente MODULO IV, Por la Universidad Cayetano Heredia.
Tutor: Solís Palomino, Edward
Autor: Prof. Pedro Natividad H.
Design and development of asterisk based computer services accessing framewor...ijcsity
We are today living in ag
e where technology continues to bring about one magical transformation after
another into our lives. Especially computers and internet that constitute the cardinal components of the
present day technology have so penetrated into our live that they today ma
ke up an indispensable part of
life. In this paper, we present an Asterisk based framework that is designed particularly to the benefit of the
visually challenged people. These people find it difficult to use the conventional computer access devices
like t
he keyboard, the mouse or the monitor as these devices require a good hand
-
eye co
-
ordination. Our
framework is designed to take DTMF input from the user that serve as commands for execution of different
operations on the computer and provide output in the
form of voice using speech synthesis. Additionally,
our framework provides the benefit of customizing it as per user needs as it is based on the open source
platform Asterisk.
Este presente trabajo realizado durante la capacitación virtual docente MODULO IV, Por la Universidad Cayetano Heredia.
Tutor: Solís Palomino, Edward
Autor: Prof. Pedro Natividad H.
Neuro genetic key based recursive modulo 2 substitution using mutated charact...ijcsity
In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been proposed
through recursive modulo
-
2 substitution using mutated character code generation for online wireless
communication of data/information.
Both sender and receive
r get synchronized based on their final output
.
The length of the key depends on the number of input and output neurons. Coordinated matching weight
vectors assist to generate chromosomes pool. Genetic secret key is obtained using fitness function, which i
s
the hamming distance between two chromosomes. Crossover and mutation are used to add elitism of
chromosomes.
At first
mutated character code table
based encryption strategy get perform on plain text.
.
Then the intermediate cipher text is yet again encry
pted through recursive positional modulo
-
2 substitution
technique to from next level encrypted text. This 2nd level intermediate cipher text is again encrypted to
form the final cipher text through chaining and cascaded xoring of neuro genetic key with the
identical
length intermediate cipher text block.
Receiver will perform same symmetric operation to get back the plain
text using identical key
Neuro genetic key based recursive modulo 2 substitution using mutated charact...ijcsity
In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been proposed
through recursive modulo
-
2 substitution using mutated character code generation for online wireless
communication of data/information.
Both sender and receive
r get synchronized based on their final output
.
The length of the key depends on the number of input and output neurons. Coordinated matching weight
vectors assist to generate chromosomes pool. Genetic secret key is obtained using fitness function, which i
s
the hamming distance between two chromosomes. Crossover and mutation are used to add elitism of
chromosomes.
At first
mutated character code table
based encryption strategy get perform on plain text.
.
Then the intermediate cipher text is yet again encry
pted through recursive positional modulo
-
2 substitution
technique to from next level encrypted text. This 2nd level intermediate cipher text is again encrypted to
form the final cipher text through chaining and cascaded xoring of neuro genetic key with the
identical
length intermediate cipher text block.
Receiver will perform same symmetric operation to get back the plain
text using identical key
2. ● Organització territorial: Sis distrits administratius (Distrit de Famagusta, Distrit de Kyrenia, Distrit de
Lárnaca, Distrit de Limassol, Distrit de Nicosia i Distrit de Pafos).
● Quantitat de població: 700.000 habitants.
● Classes socials: República independent i sobirana, amb un règim de caràcter presidencialista.
● Origen de la població: El 77% són d'origen grec, 18% provenen de Turquia.
● Nivell econòmic: Economia dominada per el sector de serveis. L'economia varia segons la política.
6. Clima i recursos naturals:
● Afavoreix la agricultura.
● Temperatura normalment alta.
● Humitat.
● Recursos naturals: Coure, guix, fusta, sal,
màrmol y pigment de argila.