scholarly journals SPEECH SIGNAL CRYPTOGRAPHY USING WPT

Author(s):  
Ziad Alqadi ◽  
Holwa Fayeq Taha

Digital speech signal is one of the most important types of data used due to the large number of computerized applications that are needed for mankind. Some computerized applications that use digital signals need a high level of security to protect the signal, and to turn it into a vague and incomprehensible signal to any third party, and that is why we have to seek a secure method of cryptography to protect the speech signal. In this research paper we will introduce a method based wavelet packet tree decomposition and reconstruction to generate an encrypted speech, the method will reorder the original speech using a secret number of decomposition levels, the obtained wavelet decomposition sizes will be used to form a speech segments, which must be rearranged in a secret order to get the encrypted speech, the introduced method will be implemented and evaluated to prove the security issues.

Author(s):  
Md Equebal Hussain ◽  
Mohammad Rashid Hussain

security is one of the most important concern on cloud computing therefore institutions are hesitating to host their data over cloud. Not all data can be afforded to move on the cloud (example accounts data). The main purpose of moving data over cloud is to reduce cost (infrastructure and maintenance), faster performance, easy upgrade, storage capacity but at the same time security is major concern because cloud is not private but maintained by third party over the internet, security issues like privacy, confidentiality, authorization (what you are allowed to do), authentication (who you are) and accounting (what you actually do) will be encountered. Variety of encryption algorithms required for higher level of security. In this paper we try to provide solution for better security by proposing a combined method of key exchange algorithm with encryption technique. Data stored in cloud can be protected from hackers using proposed solution because even if transmitted key is hacked of no use without user’s private key.


Blood ◽  
2001 ◽  
Vol 97 (2) ◽  
pp. 557-564 ◽  
Author(s):  
Peter J. Quesenberry ◽  
Suju Zhong ◽  
Han Wang ◽  
Marc Stewart

Abstract We have previously shown that the keys to high-level nontoxic chimerism in syngeneic models are stem cell toxic, nonmyelotoxic host treatment as provided by 100-cGy whole-body irradiation and relatively high levels of marrow stem cells. This approach was unsuccessful in H-2 mismatched B6.SJL to BALB/c marrow transplants, but with tolerization, stable multilineage chimerism was obtained. Ten million B6.SJL spleen cells were infused intravenously into BALB/c hosts on day −10 and (MR-1) anti-CD40 ligand monoclonal antibody (mAb) injected intraperitoneally at varying levels on days −10, −7, −3, 0, and +3 and the BALB/c mice irradiated (100 cGy) and infused with 40 million B6.SJL/H-2 mismatched marrow cells on day 0. Stable multilineage chimerism at levels between 30% to 40% was achieved in the great majority of mice at 1.6 mg anti-CD40 ligand mAb per injection out to 64 weeks after transplantation, without graft-versus-host disease. The transplanted mice were also tolerant of donor B6.SJL, but not third-party CBA/J skin grafts at 8 to 9 and 39 to 43 weeks after marrow transplantation. These data provide a unique model for obtaining stable partial chimerism in H-2 mismatched mice, which can be applied to various clinical diseases of man such as sickle cell anemia, thalassemia, and autoimmune disorders.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Yang Wu

Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility? Design/methodology/approach These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables. Findings The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues. Research limitations/implications The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems. Practical implications The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES. Social implications Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES. Originality/value This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 64 ◽  
Author(s):  
S. Renu ◽  
S.H. Krishna Veni

The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers  file protection even when the CSPs compromise. 


Author(s):  
F. Geri ◽  
O. Cainelli ◽  
G. Salogni ◽  
P. Zatelli ◽  
M. Ciolli

Public and academic interest in environmental pollution caused by toxic substances and other sources, like noise, is constantly raising. To protect public health and ecosystems it is necessary to maintain the concentrations of pollutants below a safety threshold. In this context the development of models able to assess environmental pollution impact has been identified as a priority for future research. Scientific community has therefore produced many predictive models in the field. The vast majority of them needs to be run by specialists with a deep technical knowledge of the modeled phenomena in order to process the data and understand the results and it is not feasible to use this models for simple prescreening activities. Planners, evaluators and technical operators need reliable, usable and simple tools in order to carry out screening analysis of impact assessment. <br><br> The ENVIFATE software is currently under development by the Department of Civil, environmental and mechanical engineering of the University of Trento, Italy, in the frame of a project funded by the Italian Veneto Region with the aim to make available to nonspecialists screening analysis to assess the risks of a set of possible environmental pollution sources in protected areas. <br><br> The development of ENVIFATE follows these basic requirements: i) Open-Source ii) multiplatform iii) user friendly iv) GIS oriented. In order to respect these principles we have chosen to develop a plugin of QGIS, using python as a development language and creating a module for each environmental compartment analyzed: rivers, lakes, atmospheric dispersion, dispersion in groundwater and noise. <br><br> The plugin architecture is composed of a series of core functions characterized by command line interfaces that can be called from third-party applications (such as Grass GIS), connectable in custom data flows and with a high level of modularity and scalability. The base of the different models are highly tested and reliable algorithms adopted by the Italian Institute for Protection and Environmental Research (Istituto Superiore per la Protezione e la Ricerca Ambientale – ISPRA). Due to their simplicity, and for safety reasons, the structure of these models is constrained to provide conservative results, so to overestimate actual risk. This approach allows to provide statistically validated instruments to be used in different environmental contexts. All modules of the plugin provide numerical and cartographical results: in particular the command-line interface provides "static" results, or linked to a particular spatial and temporal state, while the Qgis plugins iterate the single analysis along space and time in order to provide georeferenced maps and time distributed results.


Author(s):  
Ismail Shayeb ◽  
Naseem Asad ◽  
Ziad Alqadi ◽  
Qazem Jaber

Human speech digital signals are famous and important digital types, they are used in many vital applications which require a high speed processing, so creating a speech signal features is a needed issue. In this research paper we will study more widely used methods of features extraction, we will implement them, and the obtained experimental results will be compared, efficiency parameters such as extraction time and throughput will be obtained and a speedup of each method will be calculated. Speech signal histogram will be used to improve some methods efficiency.


Author(s):  
Shrutika Khobragade ◽  
Rohini Bhosale ◽  
Rahul Jiwahe

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.


2011 ◽  
Vol 12 (1-2) ◽  
pp. 127-156 ◽  
Author(s):  
JOACHIM SCHIMPF ◽  
KISH SHEN

AbstractECLiPSe is a Prolog-based programming system, aimed at the development and deployment of constraint programming applications. It is also used for teaching most aspects of combinatorial problem solving, for example, problem modelling, constraint programming, mathematical programming and search techniques. It uses an extended Prolog as its high-level modelling and control language, complemented by several constraint solver libraries, interfaces to third-party solvers, an integrated development environment and interfaces for embedding into host environments. This paper discusses language extensions, implementation aspects, components, and tools that we consider relevant on the way from Logic Programming to Constraint Logic Programming.


Author(s):  
Nur Amirah Borhan ◽  
Noryati Ahmad

Purpose This study aims to identify the determinants of Malaysian corporate Sukuk rating and attempts to find out which determinant has the most significant impact. Design/methodology/approach The framework tries to establish a relationship between firm’s size, profitability, Sukuk guarantee status and types of Sukuk with Sukuk rating from the perspective of Agency Theory and Information Asymmetry Theory. The data consist of 43 Sukuk issuances from 2006 to 2015. Multinomial Logistic Regression Model is then used to find out the significant determinants of Sukuk rating. Findings The study found that only three variables significantly impact Sukuk rating. The results show that a guaranteed Sukuk Ijarah or a guaranteed Sukuk Musyarakah that is issued by a highly profitable firm has a higher likelihood of getting rating AAA or rating AA as compared to getting rating A. A type of Sukuk, particularly Sukuk Murabahah, is the most significant variable influencing Sukuk rating. However, firm size is not a significant determinant of Sukuk rating in the context of this study. Research limitations implications The first limitation of the study is the relatively small sample size. Second, the study only tested four independent variables. Practical implications Several implications are derived from the results of the study. First, new firms that are planning to issue Sukuk should consistently maintain a high level of profit and consider issuing debt-based Sukuk to ensure that the issued Sukuk have higher rating. To increase the likelihood of getting higher rating, they should also consider providing a third-party guarantor. As for existing Sukuk issuers that are in lower rating category, they should increase their profitability to be upgraded to higher rating category. Second, risk-adverse investors should invest in highly profitable, guaranteed and debt-based Sukuk, as these Sukuk are likely to be in higher rating category and provide guarantee in terms of capital payments during liquidation or bankruptcy. Third, to reduce information asymmetry, policymakers should make it compulsory for all Sukuk issuers to have their Sukuk rated annually and make it mandatory for all rating agencies in Malaysia to publish their Sukuk rating methodologies. Originality/value This paper helps to expand the limited existing literature about the determinants of Sukuk rating, particularly for the Malaysian corporate Sukuk.


Sign in / Sign up

Export Citation Format

Share Document