scholarly journals Research on a Cipher-Text Fuzzy Retrieval Algorithm Based on Spatial Model

Author(s):  
Yuhua Wei
2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


Author(s):  
Narina Thakur ◽  
Deepti Mehrotra ◽  
Abhay Bansal ◽  
Manju Bala

Objective: Since the adequacy of Learning Objects (LO) is a dynamic concept and changes in its use, needs and evolution, it is important to consider the importance of LO in terms of time to assess its relevance as the main objective of the proposed research. Another goal is to increase the classification accuracy and precision. Methods: With existing IR and ranking algorithms, MAP optimization either does not lead to a comprehensively optimal solution or is expensive and time - consuming. Nevertheless, Support Vector Machine learning competently leads to a globally optimal solution. SVM is a powerful classifier method with its high classification accuracy and the Tilted time window based model is computationally efficient. Results: This paper proposes and implements the LO ranking and retrieval algorithm based on the Tilted Time window and the Support Vector Machine, which uses the merit of both methods. The proposed model is implemented for the NCBI dataset and MAT Lab. Conclusion: The experiments have been carried out on the NCBI dataset, and LO weights are assigned to be relevant and non - relevant for a given user query according to the Tilted Time series and the Cosine similarity score. Results showed that the model proposed has much better accuracy.


Author(s):  
Priya Mathur ◽  
Amit Kumar Gupta ◽  
Prateek Vashishtha

Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. Cryptography is the technique which is use to convert the plain text into cipher text using various encryption techniques. The art and science used to introduce the secrecy in the information security in order to secure the messages is defined as cryptography. In this paper we are going to review few latest Cryptographic algorithms which are used to enhance the security of the data on the cloud servers. We are comparing Short Range Natural Number Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique to secure the data in cloud.


Author(s):  
Manish M. Potey ◽  
◽  
C. A. Dhote ◽  
Deepak H. Sharma ◽  
◽  
...  

2018 ◽  
Vol 930 (12) ◽  
pp. 39-43 ◽  
Author(s):  
V.P. Savinikh ◽  
A.A. Maiorov ◽  
A.V. Materuhin

The article is a brief summary of current research results of the authors in the field of spatial modeling of air pollution based on spatio-temporal data streams from geosensor networks. The urban environment is characterized by the presence of a large number of different sources of emissions and rapidly proceeding processes of contamination spread. So for the development of an adequate spatial model is required to make measurements with a large spatial and temporal resolution. It is shown that geosensor network provide researchers with the opportunity to obtain data with the necessary spatio-temporal detail. The article describes a prototype of a geosensor network to build a detailed spatial model of air pollution in a large city. To create a geosensor in the prototype of the system, calibrated gas sensors for a nitrogen dioxide and carbon monoxide concentrations measurement were interfaced to the module, which consist of processing unit and communication unit. At present, the authors of the article conduct field tests of the prototype developed.


Author(s):  
Justin Buchler

This chapter presents a unified model of legislative elections, parties, and roll call voting, built around a party leadership election. First, a legislative caucus selects a party leader who campaigns based on a platform of a disciplinary system. Once elected, that leader runs the legislative session, in which roll call votes occur. Then elections occur, and incumbents face re-election with the positions they incrementally adopted. When the caucus is ideologically homogeneous, electorally diverse, and policy motivated, members will elect a leader who solves the collective action problem of sincere voting with “preference-preserving influence.” That leader will threaten to punish legislators who bow to electoral pressure to vote as centrists. Consequently, legislators vote sincerely as extremists and get slightly lower vote shares, but they offset that lost utility with policy gains that they couldn’t have gotten without party influence. Party leaders will rarely pressure legislators to vote insincerely.


Sign in / Sign up

Export Citation Format

Share Document