sequence number
Recently Published Documents


TOTAL DOCUMENTS

141
(FIVE YEARS 70)

H-INDEX

11
(FIVE YEARS 1)

Author(s):  
Dr. Shivanand Pujar ◽  
◽  
Ms. Kangana W.M ◽  
Ms. Chitrashree Kurtkoti ◽  
Abhinandan P. Mangaonkar ◽  
...  

Digital Image Watermarking plays an important role when it comes to maintaining digital color picture authentication information. The proposed paper consists mainly of a digital watermarking scheme consisting of discrete wavelet transformation and involving the generation of pn sequence number to embed the watermark and also to extract the watermark from the host image. The technique suggested includes both embedding the watermark and removing it from the host file. Both the method of embedding and extraction consists of generating the pn sequence number values using the random numbers. The technique for all three of the RGB signal sources is included. The watermark symbol is located independently within the RGB image's red, green, and blue channels. The suggested technique further reveals the improved mode of digital watermarking of images through fragile watermarking of images and semi-fragile digital watermarking of images.


2021 ◽  
Vol 4 (2) ◽  
pp. 233-245
Author(s):  
Dekuan Huang (黄德寬)

Abstract In 2015, Anhui University acquired a valuable batch of bamboo manuscripts from the Warring States period. The Anda slips have received wide attention both abroad and in China, in particular the Shi jing manuscript contained therein. This article discusses the sequence, number, and variants of the songs, titles, wording, and phrasing in the Shi jing manuscript. The final section of this article introduces the philological value of this find.


Author(s):  
Charles Blanov Hasudungan Pakpahan ◽  
Siti Agustini

MANET adalah sekelompok node yang membentuk kesatuan dan mengirim paket kepada node yang lain. Namun dari segi keamanan, MANET sangat rentan terhadap berbagai macam serangan. Serangan black hole merupakan jenis serangan pada jaringan yang dapat menyerap network traffic dan menjatuhkannya. Cara kerja dari serangan black hole adalah dengan berpura-pura memiliki rute yang cukup fresh ke semua tujuan yang diminta oleh semua node dan menyerap semua network traffic. Saat node sumber melakukan broadcast pesan RREQ untuk node tujuan, node black hole akan segera merespon dengan pesan RREP yang berisi informasi sequence number tertinggi dan pesan ini dianggap seolah-olah datang dari node tujuan atau dari node yang memiliki rute yang cukup fresh ke node tujuan. IDSAODV merupakan suatu routing protokol yang digunakan untuk meminimalisir efek dari black hole. Protokol IDSAODV akan memeriksa paket RREP dari node black hole untuk jalur minimum ke tujuan dan maksimum sequence number tujuan. Protokol IDSAODV akan membuang paket RREP pertama yang datang dari node black hole dan memilih paket RREP kedua yang datang dari node tujuan. Pada penelitian ini akan dilakukan uji coba serangan black hole pada lingkungan MANET dengan jumlah node sebanyak 100, 110, 120, 130, 140, dan 150 dengan menggunakan routing protokol AODV dan IDSAODV. Dari percobaan tersebut didapatkan hasil peningkatan Packet Delivery Ratio (PDR) paling tinggi sebesar 47,36%, peningkatan Throughput sebesar 156,78 Kbps dan penurunan End-to-End Delay sebesar 27,62 ms.


Author(s):  
Hussein Khayou ◽  
Margarita A. Orlova ◽  
Leonid I. Abrosimov

2021 ◽  
Vol 40 (4) ◽  
pp. S225
Author(s):  
Z. Tran ◽  
S.T. Kim ◽  
Y. Sanaiha ◽  
J. Hadaya ◽  
M. Gandjian ◽  
...  

Author(s):  
D. Kothandaraman ◽  
Seena Naik Korra ◽  
A. Balasundaram ◽  
S. Magesh Kumar

2020 ◽  
Vol 16 (01) ◽  
pp. 49-53
Author(s):  
VV Potdar ◽  
Sachin Joshi ◽  
Marimuthu Swaminathan

Data on 98336 artificial inseminations (AI) performed during 6 years (January 2010 to November 2015) on 56037 field animals owned by 29097 farmers’ from 44 cattle development centres spread across two districts of Maharashtra state were collected and analyzed. Whole data set was classified according to districts (Beed, Jalgaon), economic status of farmers (APL, BPL), animal breed (HF cross, Indigenous, Jersey cross, Non-descript), parity of animal (heifer, first, second, third, fourth, fifth calvers), animal body condition score (no rib exposed, one rib exposed, two ribs exposed, three ribs exposed), heat stage (early, mid, late), season of AI (rainy-June to September, winter-October to January, summer-February to May), bull breed used for AI ( HF, HF crossbreed, Jersey, Jersey crossbreed, Indigenous), AI sequence number (1,2,3) and AI Year (2010 to 2015). Least square analysis was used to compute conception rate. The results revealed overall mean conception rate as 46.2 ± 0.51% and it was significantly (p les than 0.01) higher in Beed district, Jersey crossbreed animals, animals having fourth parity, animals exhibiting one rib exposed, early heat and animals inseminated with Indigenous breed bulls semen, first AI sequence number and during the year 2015 compared with respective groups of parameters under study. However, effect of season of AI and economic condition of farmers did not affect conception rate in animals under field conditions of Maharashtra.


2020 ◽  
Vol 21 (01) ◽  
pp. 2150002
Author(s):  
Chris Lambie-Hanson ◽  
Assaf Rinot

Motivated by a characterization of weakly compact cardinals due to Todorcevic, we introduce a new cardinal characteristic, the [Formula: see text]-sequence number, which can be seen as a measure of the compactness of a regular uncountable cardinal. We prove a number of [Formula: see text] and independence results about the [Formula: see text]-sequence number and its relationship with large cardinals, stationary reflection, and square principles. We then introduce and study the more general [Formula: see text]-sequence spectrum and uncover some tight connections between the [Formula: see text]-sequence spectrum and the strong coloring principle [Formula: see text], introduced in Part I of this series.


Wireless sensor networks can be used to deliver status information to users in real time. The sensor nodes used in wireless sensor networks are arranged by attaching sensors to acquire necessary information, such as vibration, sound, light, and temperature. Since a sensor node is small in size and inexpensive, it is advantageous for monitoring large areas. When a sensor node senses a change in a situation, this event information is wirelessly communicated with other sensor nodes and transmitted to a base station. However, since the sensor nodes used in wireless sensor networks are small and inexpensive, there are restrictions in terms of their battery life, memory, and computing power. An attacker can easily compromise a sensor node and use a compromised node to attempt message tampering and energy consumption attacks. EDDK is a scheme that detects attacks from compromised nodes through key management. EDDK uses a pairwise key and a local cluster key to defend against various attacks in the network. In addition, EDDK protects against replay attacks by using sequence numbers and guarantees message integrity. However, since the sequence number and sensor node ID are not encrypted, they can be used as an attack element. An attacker can attempt a replay attack by manipulating the sequence number through sniffing. A replay attack that occurs in a wireless sensor network consumes sensor node energy and confuses the user. In order to defend against such an attack, we propose a sequence number encryption scheme. The proposed scheme detects new types of replay attacks and shows about 7% energy improvement.


2020 ◽  
Vol 17 (9) ◽  
pp. 3995-3998
Author(s):  
K. Kavyashree ◽  
C. N. Sowmyarani ◽  
P. Dayananda

The network community in the current scenario has faced lot of potential threats like restricted access to unauthorized network; break in through other organizations, making the system unavailable and so on. An off-path attacker can perform various attacks like Browser page read, Web phishing, website Spoofing and defacement to know the 4 tuples in Transmission Control Protocol. The attacker can also carry out Cross Site Scripting to know the sensitive information on websites. Cross Site Request Forgery which performs defective exploit on web. This helps in detecting the four tuples Sequence number, Acknowledgement number, Global IPID Counter and ports.


Sign in / Sign up

Export Citation Format

Share Document