scholarly journals Encryption Image using HiSea Algorithm Based on Android Operating System

Author(s):  
Zainab Khyioon Abdalrdha

The mobile phone environment represents one of the important environments in encryption various multimedia (audio, image, and video) , and this depends on the type of algorithm used in the encryption process, as phones have limited memory and computational resources, Therefore the selection of the algorithm must be compatible with the mobile environment in terms of speed, safety and flexibility in addition to choosing an algorithm that The simplicity and safety of the image encryption process was investigated with lightweight and efficient computing. In this paper, Hybrid Cube Encryption (HiSec) was used. When implementing this algorithm in a smart phone environment, the results showed the ease of encrypting images and retrieving the original image, in addition to that it only requires small computational resources, and the algorithm was very effective in encrypting images on mobile phones. This suggested method has been implemented in the mobile environment with android OS. The proposed method has been programmed in JAVA, and the method has been tried on different types of mobile phones (such as Huawei Nova 2, Huawei Nova 7, HTC, NOT 8, Galaxy S 20, and HONOR).

2014 ◽  
Vol 41 (1) ◽  
pp. 47-50
Author(s):  
Jane Stephan ◽  
Zahra Dhaief

Mobile phones are the most commonly used devices in today’s scenario. The expanding use of mobile phones, telecommunicationcompanies added feature such as SMS (Short Messaging Service) in order to attract more customers. The Short Messaging Service (SMS) hasbecome very popular for sending messages containing information among mobile users. Alongside, the need for the secure communicationbecame more imperative. SMS security ensures security of messages from the access of unauthorized users. Using RSA algorithm to encryptionof message that length is 160 character. In this paper present approach encryption message for type a SMS then send to other user. This approachis applied in mobile environment with android operating system. The platform used here is JAVA and the proposed approach is tested differenttypes of mobile types (Galaxy S3, Galaxy S4, HTC).


Author(s):  
Ravikant Tiwari ◽  
Mr. Shadab Siddique

- This paper deals with different types of operating system and also with the importance of the operating in a device (i.e. computers, mobile). Unfolding some of the questions like the need of different kinds of operating system and requirement of operating system within a device. We will also see the advantage of different types of operating system and disadvantages too. The paper will cover not only operating system for computers but also the systems which we use in our day to day life such as mobile phones (android) and the once which we use in our computers (windows, linux, etc).


2021 ◽  
Vol 13 (4) ◽  
pp. 2146
Author(s):  
Anik Gupta ◽  
Carlos J. Slebi-Acevedo ◽  
Esther Lizasoain-Arteaga ◽  
Jorge Rodriguez-Hernandez ◽  
Daniel Castro-Fresno

Porous asphalt (PA) mixtures are more environmentally friendly but have lower durability than dense-graded mixtures. Additives can be incorporated into PA mixtures to enhance their mechanical strength; however, they may compromise the hydraulic characteristics, increase the total cost of pavement, and negatively affect the environment. In this paper, PA mixtures were produced with 5 different types of additives including 4 fibers and 1 filler. Their performances were compared with the reference mixtures containing virgin bitumen and polymer-modified bitumen. The performance of all mixes was assessed using: mechanical, hydraulic, economic, and environmental indicators. Then, the Delphi method was applied to compute the relative weights for the parameters in multi-criteria decision-making methods. Evaluation based on distance from average solution (EDAS), technique for order of the preference by similarity to ideal solution (TOPSIS), and weighted aggregated sum product assessment (WASPAS) were employed to rank the additives. According to the results obtained, aramid pulp displayed comparable and, for some parameters such as abrasion resistance, even better performance than polymer-modified bitumen, whereas cellulose fiber demonstrated the best performance regarding sustainability, due to economic and environmental benefits.


2021 ◽  
Vol 11 (11) ◽  
pp. 5235
Author(s):  
Nikita Andriyanov

The article is devoted to the study of convolutional neural network inference in the task of image processing under the influence of visual attacks. Attacks of four different types were considered: simple, involving the addition of white Gaussian noise, impulse action on one pixel of an image, and attacks that change brightness values within a rectangular area. MNIST and Kaggle dogs vs. cats datasets were chosen. Recognition characteristics were obtained for the accuracy, depending on the number of images subjected to attacks and the types of attacks used in the training. The study was based on well-known convolutional neural network architectures used in pattern recognition tasks, such as VGG-16 and Inception_v3. The dependencies of the recognition accuracy on the parameters of visual attacks were obtained. Original methods were proposed to prevent visual attacks. Such methods are based on the selection of “incomprehensible” classes for the recognizer, and their subsequent correction based on neural network inference with reduced image sizes. As a result of applying these methods, gains in the accuracy metric by a factor of 1.3 were obtained after iteration by discarding incomprehensible images, and reducing the amount of uncertainty by 4–5% after iteration by applying the integration of the results of image analyses in reduced dimensions.


2021 ◽  
pp. 1-21
Author(s):  
Muhammad Shabir ◽  
Rimsha Mushtaq ◽  
Munazza Naz

In this paper, we focus on two main objectives. Firstly, we define some binary and unary operations on N-soft sets and study their algebraic properties. In unary operations, three different types of complements are studied. We prove De Morgan’s laws concerning top complements and for bottom complements for N-soft sets where N is fixed and provide a counterexample to show that De Morgan’s laws do not hold if we take different N. Then, we study different collections of N-soft sets which become idempotent commutative monoids and consequently show, that, these monoids give rise to hemirings of N-soft sets. Some of these hemirings are turned out as lattices. Finally, we show that the collection of all N-soft sets with full parameter set E and collection of all N-soft sets with parameter subset A are Stone Algebras. The second objective is to integrate the well-known technique of TOPSIS and N-soft set-based mathematical models from the real world. We discuss a hybrid model of multi-criteria decision-making combining the TOPSIS and N-soft sets and present an algorithm with implementation on the selection of the best model of laptop.


2021 ◽  
Vol 13 (5) ◽  
pp. 956
Author(s):  
Florian Mouret ◽  
Mohanad Albughdadi ◽  
Sylvie Duthoit ◽  
Denis Kouamé ◽  
Guillaume Rieu ◽  
...  

This paper studies the detection of anomalous crop development at the parcel-level based on an unsupervised outlier detection technique. The experimental validation is conducted on rapeseed and wheat parcels located in Beauce (France). The proposed methodology consists of four sequential steps: (1) preprocessing of synthetic aperture radar (SAR) and multispectral images acquired using Sentinel-1 and Sentinel-2 satellites, (2) extraction of SAR and multispectral pixel-level features, (3) computation of parcel-level features using zonal statistics and (4) outlier detection. The different types of anomalies that can affect the studied crops are analyzed and described. The different factors that can influence the outlier detection results are investigated with a particular attention devoted to the synergy between Sentinel-1 and Sentinel-2 data. Overall, the best performance is obtained when using jointly a selection of Sentinel-1 and Sentinel-2 features with the isolation forest algorithm. The selected features are co-polarized (VV) and cross-polarized (VH) backscattering coefficients for Sentinel-1 and five Vegetation Indexes for Sentinel-2 (among us, the Normalized Difference Vegetation Index and two variants of the Normalized Difference Water). When using these features with an outlier ratio of 10%, the percentage of detected true positives (i.e., crop anomalies) is equal to 94.1% for rapeseed parcels and 95.5% for wheat parcels.


2021 ◽  
Vol 6 (1) ◽  
Author(s):  
Kangkang Zha ◽  
Xu Li ◽  
Zhen Yang ◽  
Guangzhao Tian ◽  
Zhiqiang Sun ◽  
...  

AbstractArticular cartilage is susceptible to damage but hard to self-repair due to its avascular nature. Traditional treatment methods are not able to produce satisfactory effects. Mesenchymal stem cells (MSCs) have shown great promise in cartilage repair. However, the therapeutic effect of MSCs is often unstable partly due to their heterogeneity. Understanding the heterogeneity of MSCs and the potential of different types of MSCs for cartilage regeneration will facilitate the selection of superior MSCs for treating cartilage damage. This review provides an overview of the heterogeneity of MSCs at the donor, tissue source and cell immunophenotype levels, including their cytological properties, such as their ability for proliferation, chondrogenic differentiation and immunoregulation, as well as their current applications in cartilage regeneration. This information will improve the precision of MSC-based therapeutic strategies, thus maximizing the efficiency of articular cartilage repair.


2021 ◽  
Author(s):  
Deborah Martínez ◽  
Rafael Guzmán-Cabrera ◽  
Daniel A. May-Arrioja ◽  
Iván Hernández-Romano ◽  
Miguel Torres-Cisneros

Author(s):  
Shweta Rani ◽  
Bharti Suri

Mutation testing is a successful and powerful technique, specifically designed for injecting the artificial faults. Although it is effective at revealing the faults, test suite assessment and its reduction, however, suffer from the expense of executing a large number of mutants. The researchers have proposed different types of cost reduction techniques in the literature. These techniques highly depend on the inspection of mutation operators. Several metrics have been evolved for the same. The selective mutation technique is most frequently used by the researchers. In this paper, the authors investigate different metrics for evaluating the traditional mutation operators for Java. Results on 13 Java programs indicate how grouping few operators can impact the effectiveness of an adequate and minimal test suite, and how this could provide several cost benefits.


2018 ◽  
Vol 176 ◽  
pp. 04006 ◽  
Author(s):  
Pei Xuesheng ◽  
Wang Yang

Modern electronic products are changing with each passing day, and the most prominent one is the smart phone. Screen is the key part for people to extract and exchange information through mobile phones, and its development is very rapid. This article summarize the development laws of screen size, screen occupation ratio, resolution and shape from the perspective of user experience, and analyze the reasons for its development law. According to the research, the optimal size of the mobile phone screen suitable for the users is summed up and verified through the questionnaire, which provides a reliable basis for the developer of mobile phone to design smart phone screen and improve the satisfaction of the user experience.


Sign in / Sign up

Export Citation Format

Share Document