readable form
Recently Published Documents


TOTAL DOCUMENTS

122
(FIVE YEARS 15)

H-INDEX

7
(FIVE YEARS 1)

2022 ◽  
Author(s):  
Jonathan Tennant ◽  
Nate Breznau

This work is a transcribed and edited collection of the message delivered by Jon Tennant in his talk “Open science is just good science”, May 21st, 2018. In readable form with many links, this paper provides a primer on open science and the open science movement. It details the problems with closed access science as it is still practiced today, and how big publishing as an industry is largely responsible. It talks about the ethics behind open science practices. It provides many statistics and links to information about paywalls, movements such as Project DEAL, workflows, and personal and community issues such as fear and cultural inertia that may prevent us from adopting better science practices.


2022 ◽  
pp. 132-144
Author(s):  
Sneha Padhiar ◽  
Kuldip Hiralal Mori

With the rise in use of internet in various fields like education, military, government sector, banking, the security and privacy of the info has been the foremost concern. As in today's era, most of the handling of data and transactions are done online. When the data is transferred from the one end of sender to the other end of receiver online, it's eavesdropped by an intruder and thus could be a threat to the secrecy or confidentiality of the info. The hottest technique that protects the confidentiality of the data is cryptography which converts the plain text into scrambled form which is unreadable. Then the receiver applies a reverse mechanism to decrypt the unreadable data to readable form. This mechanism is known as encryption-decryption process or cryptography. Cryptography can be both symmetric and asymmetric. Here the authors discuss symmetric and asymmetric algorithms.


2021 ◽  
Author(s):  
Akula Vamsi Krishna Rao ◽  
V.N. Aditya Datta Chivukula ◽  
Sri Keshava Reddy Adupala ◽  
Abhiram Reddy Cholleti

In recent years, security has become a big issue for many applications to defend attacks from intruders. Exchanging credentials in plaintext might expose it to stealers. Many techniques are required to protect the data of the consumers from attackers. Cryptography has come up with a solution to provide security for the users to exchange data securely by the means of the process called as Encryption/ Decryption. In this field, there are basically two techniques of cryptography i.e Symmetric and asymmetric, developed to achieve a secure connection between the sender and receiver. These techniques provide specific goals in maintaining privacy by converting original message to non-readable form and sends it over a communication channel. The unauthorized members try to break the non-readable form but the difficulty depends upon the techniques that were used to encrypt the data. In this paper, we proposed a quadruple encryption algorithm consists of novel phase-shift algorithm, AES (Advanced Encryption Standard), TwoFish and RC4 and making it hard to attack by common methods.


2021 ◽  
Vol 2094 (3) ◽  
pp. 032056
Author(s):  
A A Dzyubanenko ◽  
A V Rabin

Abstract The paper proposes the implementation of the method of optical recognition of technical documentation and the transformation of graphic information into a machine-readable form available for cognitive analysis, which is based on the methods of binarization and alignment of images, text segmentation and recognition. The use of the proposed method will provide a dramatic reduction in the costs of cataloging, checking the completeness and inventory of documentation, as well as an increase in design quality due to the semantic analysis of documentation using a knowledge base that is updated automatically. The article presents the development of the algorithm for optical recognition of a document, preparation of an image for optical recognition of a document, an example of the application of the Sauvola method for binarization of an image, and an analysis of the research results. The proposed implementation allows the text recognition on scanned/photographed documents.


2021 ◽  
pp. 107755872110247
Author(s):  
Sayeh Nikpay ◽  
Ezra Golberstein ◽  
Hannah T. Neprash ◽  
Caitlin Carroll ◽  
Jean M. Abraham

As of January 1, 2021, most U.S. hospitals are required to publish pricing information on their website to promote more informed decision making by consumers regarding their care. In a nationally representative sample of 470 hospitals, we analyzed whether hospitals met price transparency information reporting requirements and the extent to which complete reporting was associated with ownership status, bed size category, system affiliation, and location in a metropolitan area. Fewer than one quarter of sampled hospitals met the price transparency information requirements of the new rule, which include five types of standard charges in machine-readable form and the consumer-shoppable display of 300 shoppable services. Our analyses of hospital reporting by organizational and market attributes revealed limited differences, with some exceptions for nonprofit and system-member hospitals demonstrating greater responsiveness with respect to the consumer-shoppable aspects of the rule.


Author(s):  
Pravin Soni, Et. al.

Over a few years, there is rapid increase of exchange of data over the net has brought data confidentiality and its privacy to the fore front. Data confidentiality can be achieved by implementing cryptography algorithms during transmission of data which confirms that data remains secure and protected over an insecure network channel. In order to ensure data confidentiality and privacy, cryptography service encryption is used which makes data in unreadable form while the reverse process rearranges data in readable form and known as decryption. All encryption algorithms are intended to provide confidentiality to data, but their performance varies depending on many variables such as key size, type, number of rounds, complexity and data size used. In addition, although some encryption algorithms outperform others, they have been found to be prone to particular attacks. This paper reviews and summarizes the various common hybrid cascaded n-tier encryption models. Additionally, this paper compares and analyzes the performance of common hybrid cascaded 2-tier and 3-tier encryption models obtained during simulation based on encryption/decryption time, avalanche effect and throughput. The models compared with AES are 2-tier models (AES-TWOFISH, AES-BLOWFISH, TWOFISH-AES, BLOWFISH-AES, AES-SERPENT and SERPENT-TWOFISH) and 3-tier models (DES-BLOWFISH-AES, AES-TWOFISH-SERPENT and SERPENT-TWOFISH-AES). The hybrid cascaded model like AES-TWOFISH, AES-BLOWFISH and SERPENT-TWOFISH-AES are better hybrid models with respect to throughput and avalanche effect. 


2021 ◽  
Author(s):  
Matheus Pereira Lobo

We translate the proof of the theorem stated in the title, accomplished by Prover9, into a human readable form.


2021 ◽  
Vol 45 (1) ◽  
pp. 101-109
Author(s):  
M.A. Aliev ◽  
I.A. Kunina ◽  
A.V. Kazbekov ◽  
V.L. Arlazarov

During the process of document recognition in a video stream using a mobile device camera, the image quality of the document varies greatly from frame to frame. Sometimes recognition system is required not only to recognize all the specified attributes of the document, but also to select final document image of the best quality. This is necessary, for example, for archiving or providing various services; in some countries it can be required by law. In this case, recognition system needs to assess the quality of frames in the video stream and choose the “best” frame. In this paper we considered the solution to such a problem where the “best” frame means the presence of all specified attributes in a readable form in the document image. The method was set up on a private dataset, and then tested on documents from the open MIDV-2019 dataset. A practically applicable result was obtained for use in recognition systems.


2021 ◽  
Vol 19 (3) ◽  
pp. 47-54
Author(s):  
D. D. Bazhenova ◽  
◽  
M. Aiman Al Akkad ◽  
A. A. Ivakin ◽  
◽  
...  

High-speed radio link HSRL is designed to transmit target information from spacecraft equipment to the ground. A block of onboard equipment for storing temporary data OESTD is a part of the onboard equipment of a high-speed radio link OEHSRL. Before the spacecraft is launched into space, acceptance tests of the input control are carried out. To do this, it was necessary to develop testing equipment TE and software for it. TE of OESTD is designed to check the OESTD in general and each block in particular during autonomous tests. This paper considers the subsystem of technological software - a component of the TE software system, which allows checking the operation of the FPGA as part of the OESTD. The subsystem main algorithms and functions performed by the subsystem are given. The interaction of the operator of control and testing equipment with programmable logic integrated circuits FPGA, which are part of the on-board equipment block for storing temporary data of the OESTD, is considered. Debugging software is required to enable this interaction. An FPGA with the RISC-V architecture was chosen, debugging via GRMON turned out to be impossible and OpenOCD was chosen. As a result, a technological software module was developed for testing and ensuring the operability of the FPGA as part of the onboard equipment for storing temporary data. The following components were developed: a subsystem for interaction with the device to ensure the ability to send commands and receive response messages, service functions to convert response messages into a readable form for the operator, a subsystem for interaction of the module with the main frame of the TE software, and widgets to provide the ability to manually enter commands from the user conveniently.


Author(s):  
Satya Bhushan Verma ◽  
Shashi Bhushan Verma

In the world of computation, the encryption is a technique by which the plaintext or any type of data which is converted from the readable form is transformed into an encoded form. That encoded form can only be read by another entity if they have corrected key for decryption. The proposed technique providing the security to the data in inefficient way that can be further use in implementation in new upcoming task and enhancement in current running projects of SOA (Service Oriented Architecture) BPEL (Business Process Execution Language).


Sign in / Sign up

Export Citation Format

Share Document