Enhancing Security On Mosaic Images Using Cryptographic Algorithm And Compression Technique-A Review

Author(s):  
Ms. Nilam Gandhe ◽  
Author(s):  
Poreddy Srikanth Reddy ◽  
Penjuri Subhash Chandra Bose ◽  
Vuppula Sruthi ◽  
Damineni Saritha

The aim of the present work was to prepare floating tablets of galantamine HBr using sodium alginate and xanthan gum as matrix forming carriers. Galantamine HBr is used for the treatment of mild to moderate Alzheimer's disease and various other memory impairments, in particular those of vascular origin. The matrix tablet formulations were prepared by varying the concentrations of sodium alginate and xanthan gum. The tablets were prepared by direct compression technique using PVP K-30 as a binder and sodium bicarbonate for development of CO2. The prepared matrix tablets were evaluated for properties such as hardness, thickness, friability, weight variation, floating lag time, compatibility using DSC and FTIR. In vitro dissolution was carried out for 12 hrs in 0.1N HCl at 37±0.5 ºC using USP paddle type dissolution apparatus. It was noted that, all the prepared formulations had desired floating lag time and constantly floated on dissolution medium by maintaining the matrix integrity. The drug release from prepared tablets was found to vary with varying concentration of the polymers, sodium alginate and xanthan gum. From the study it was concluded that floating drug delivery system for galantamine HBr can be prepared by using sodium alginate and xanthan gum as a carrier.


2018 ◽  
Vol 1 (1) ◽  
pp. 77-90
Author(s):  
Walaa Abdelaziem ◽  
Atef Hamada ◽  
Mohsen A. Hassan

Severe plastic deformation is an effective method for improving the mechanical properties of metallic alloys through promoting the grain structure. In the present work, simple cyclic extrusion compression technique (SCEC) has been developed for producing a fine structure of cast Al-1 wt. % Cu alloy and consequently enhancing the mechanical properties of the studied alloy. It was found that the grain structure was significantly reduced from 1500 µm to 100 µm after two passes of cyclic extrusion. The ultimate tensile strength and elongation to failure of the as-cast alloy were 110 MPa and 12 %, respectively. However, the corresponding mechanical properties of the two pass CEC deformed alloy are 275 MPa and 35%, respectively. These findings ensure that a significant improvement in the grain structure has been achieved. Also, cyclic extrusion deformation increased the surface hardness of the alloy by 49 % after two passes. FE-simulation model was adopted to simulate the deformation behavior of the material during the cyclic extrusion process using DEFORMTM-3D Ver11.0. The FE-results revealed that SCEC technique was able to impose severe plastic strains with the number of passes. The model was able to predict the damage, punch load, back pressure, and deformation behavior.


2020 ◽  
Vol 4 (3) ◽  
pp. 591-600
Author(s):  
Mochammad Rizky Royani ◽  
Arief Wibowo

The development of e-commerce in Indonesia in the last five years has significantly increased the growth for logistics service companies. The Indonesian Logistics and Forwarders Association (ALFI) has predicted the growth potential of the logistics business in Indonesia to reach more than 30% by 2020. One of the efforts of logistics business companies to improve services in the logistics services business competition is to implement web service technology on mobile platforms, to easy access to services for customers. This research aims to build a web service with a RESTful approach. The REST architecture has limitations in the form of no authentication mechanism, so users can access and modify data. To improve its services, JSON Web Token (JWT) technology is needed in the authentication process and security of access rights. In terms of data storage and transmission security, a cryptographic algorithm is also needed to encrypt and maintain confidentiality in the database. RC4 algorithm is a cryptographic algorithm that is famous for its speed in the encoding process. RC4 encryption results are processed with the Base64 Algorithm so that encrypted messages can be stored in a database. The combination of the RC4 method with the Base64 method has strengthened aspects of database security. This research resulted in a prototype application that was built with a combination of web service methods, JWT and cryptographic techniques. The test results show that the web service application at the logistics service company that was created can run well with relatively fast access time, which is an average of 176 ms. With this access time, the process of managing data and information becomes more efficient because before making this application the process of handling a transaction takes up to 20 minutes.


Author(s):  
Hikka Sartika ◽  
Taronisokhi Zebua

Storage space required by an application is one of the problems on smartphones. This problem can result in a waste of storage space because not all smartphones have a very large storage capacity. One application that has a large file size is the RPUL application and this application is widely accessed by students and the general public. Large file size is what often causes this application can not run effectively on smartphones. One solution that can be used to solve this problem is to compress the application file, so that the size of the storage space needed in the smartphone is much smaller. This study describes how the application of the elias gamma code algorithm as one of the compression technique algorithms to compress the RPUL application database file. This is done so that the RPUL application can run effectively on a smartphone after it is installed. Based on trials conducted on 64 bit of text as samples in this research it was found that compression based on the elias gamma code algorithm is able to compress text from a database file with a ratio of compression is 2 bits, compression ratio is 50% with a redundancy is 50%. Keywords: Compression, RPUL, Smartphone, Elias Gamma Code


Author(s):  
Winda Winda ◽  
Taronisokhi Zebua

The size of the data that is owned by an application today is very influential on the amount of space in the memory needed one of which is a mobile-based application. One mobile application that is widely used by students and the public at this time is the Complete Natural Knowledge Summary (Rangkuman Pengetahuan Alam Lengkap or RPAL) application. The RPAL application requires a large amount of material storage space in the mobile memory after it has been installed, so it can cause this application to be ineffective (slow). Compression of data can be used as a solution to reduce the size of the data so as to minimize the need for space in memory. The levestein algorithm is a compression technique algorithm that can be used to compress material stored in the RPAL application database, so that the database size is small. This study describes how to compress the RPAL application database records, so as to minimize the space needed on memory. Based on tests conducted on 128 characters of data (200 bits), the compression results obtained of 136 bits (17 characters) with a compression ratio is 68% and redundancy is 32%.Keywords: compression, levestein, aplication, RPAL, text, database, mobile


2018 ◽  
Vol 28 (4) ◽  
pp. 1361-1365
Author(s):  
Ilhan Istikbal Ibryam ◽  
Byulent Mustafa Mustafa ◽  
Atti Rashtid Mustafa

With the introduction of Information Technology in educational process we need more often to use electronic evaluation. The examples of test variants in the secondary school are often prepared with the help of word processing editors as WordPad that has good opportunities for elementary text formatting. Another part of the teachers often use Microsoft Word when preparing their tests. It is true that Microsoft Word has much more editing and formatting instruments than WordPad. For access to electronic educational resources suggested by the school teachers two or more computer networks are built (teachers' and learners'). Using these networks and their access rights, each user, learner or teacher, has the opportunity to add files and directories into the school database (DB). Learners can add files with the exercises they have done during their classes. Teachers suggest through the database the electronic lessons they have developed. At the end of each unit each teacher prepares an electronic test. In it there are described the evaluation criteria depending on the number of points the student has gathered through correct responses. In most cases we notice that in the teachers' network files with the responses of the tests are added later on. Not always the means for defence offered by the system administrators at the school can guarantee the safety of our files and more exactly the manipulation of the answers of the electronic forms of check up. Aiming at more effective defence of the text files, this article views an algorithm created by us for cryptographic defence of text files and it's application in secondary school. The effective use of cryptographic information defence minimises the opportunity to decipher the coded information aiming at its misuse by the learners. Providing safe defence against unsanctioned access in computer communication is a complex and extensive task which is solved by means of a set of measures of organisation and programme-technical character. The defence of the process of submitting data requires utmost attention because it concerns the most vulnerable and accessible for violation points in the communication systems.


Sign in / Sign up

Export Citation Format

Share Document