Variational Image Dehazing Based on Multi-Scale Fusion
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1224-1228, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12241228
Abstract
Dehazing plays a leading role in numerous image processing applications. The visibility of outside images is mostly questioned due to the presence of haze, fog, sandstorms, and other such factors. This paper presents that image dehazing is commonly used in many outside working arrangements. Fusion Based Variational Image Dehazing (FVID) technique that is grounded upon the fusion-based approach. Through white-balance along with a contrast improving technique, two images are deduced from the original hazy image which was blurry in the first place. The inputs that are created, along with their significant characteristics are sorted by computing three weight maps: luminance, chromaticity, and saliency, to areas that have greater visibility levels. These weight maps of the inputs are fused, generates haze free image. Experimental outcomes of an extensive range of hazy images validate that FVID is far better when it comes to preserving the structure of the image on regions that are close by and are less affected by the fog.
Key-Words / Index Term
Image Dehazing, Variational Image Processing, Fusion based weight maps, Degraded image, Contrast Enhancement
References
[1] Adrian Galdran, Javier Vazquez-Corral, David Pardo, and Marcelo Bertalm´ıo” Fusion-based Variational Image Dehazing” IEEE SIGNAL PROCESSING LETTERS, VOL. N, NO. N, MAY 2016
[2] Codruta Orniana Ancuti and Cosmin Ancuti single image dehazing by multi-scale fusion ieee transactions on image processing, vol. 22, no.8, august 2013.
[3] Dr. H.B. Kekre et al. review on image fusion techniques and performance evaluation parameters International Journal of Engineering Science and Technology (IJEST) Vol. 5 No.04 April 2013.
[4] Ma, Z., Wen, J., Zhang, C., Liu, Q., & Yan, D. (2016). An effective fusion defogging approach for single sea fog image. Neurocomputing, 173, 1257-1267.
[5] H. Koschmieder, Theorie der horizontalen Sichtweite: Kontrast und Sichtweite. Keim & Nemnich, 1925.
[6] Neha Padole1, Akhil Khare2”Improved Method of Single Image Dehazing based on Multi-Scale Fusion” Neha Padole et al, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (3) , 2015, 2945-2949.
[7] Nicy Johnson, Afrah Abdul Kader ,Jiss Paul#3, Shemil PS, Rizwana A “Haze Removal using Colour Attenuation prior” International Journal of Computer Trends and Technology (IJCTT) – Volume 48 Number 2 June 2017.
Citation
B. Jyothi, Chandra Mohan Reddy Sivappagari, "Variational Image Dehazing Based on Multi-Scale Fusion," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1224-1228, 2018.
Unique Finger Correctness Detection Using CNN
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1229-1234, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12291234
Abstract
Motivated by increasing in the usage of statistics systems from few years, spoof fingerprint detection has aging regularly. This uses CNN for the detection of thumbprint vitality. It compares 4 different models: Convolutional neural networks fine-tuned with thumbprint images and CNN pretrained on natural images, CNN with erratic weights, and LBP. Offensive thumbprint-based biometry organizations through awarding mock thumbs next to the radar can stand a thoughtful hazard intended for abandoned submission. Dataset expansion stood cast-off towards growth classifier’s recital besides a variability of preprocessing practice stayed confirmed, aforesaid as occurrence riddling, distinction mathematical besides county appertaining to curiosity.
Key-Words / Index Term
Thumbprint acknowledgement, SVM, convolutional neural networks, appliance erudition
References
[1] A. Antonelli, R. Cappelli, D. Maio, and D. Maltoni, “Fake finger detection by skin distortion analysis,” IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 360–373, Sep. 2006.
[2] D. Gragnaniello, G. Poggi, C. Sansone, and L. Verdoliva, “Fingerprint liveness detection based on weber local image descriptor,” in Proc. IEEE Workshop Biometric Meas. Syst. Secur. Med. Appl. (BIOMS), Sep. 2013, pp. 46–50.
[3] D. Menotti et al., “Deep representations for iris, face, and fingerprint spoofing detection,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 4, pp. 864–879, Apr. 2015.
[4] X. Jia et al., “Multi-scale local binary pattern with filters for spoof fingerprint detection,” Inf. Sci., vol. 268, pp. 91–102, Jun. 2014.
[5] L. Ghiani, G. L. Marcialis, and F. Roli, “Fingerprint liveness detection by local phase quantization,” in Proc. 21st Int. Conf. Pattern Recognit. (ICPR), 2012, pp. 537–540.
[6] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Proc. Adv. Neural Inf. Process. Syst., 2012, pp. 1097–1105.
[7] T. Ahonen, A. Hadid, and M. Pietikäinen, “Face recognition with local binary patterns,” in Computer Vision. Heidelberg, Germsany: Springer, 2004, pp. 469–481.
[8] A. K. Jain, Y. Chen, and M. Demirkus, “Pores and ridges: Highresolution fingerprint matching using level 3 features,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 1, pp. 15–27, Jan. 2007
[9] L. Ghiani, G. L. Marcialis, and F. Roli, “Fingerprint liveness detection by local phase quantization,” in Proc. 21st Int. Conf. Pattern Recognit. (ICPR), 2012.
Citation
Sneha Sadula, N V Sailaja, "Unique Finger Correctness Detection Using CNN," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1229-1234, 2018.
Load Balancing on the Cloud Environment
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1235-1237, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12351237
Abstract
Cloud Computing is the growing technology. It is a means of having multiple computing processes, making do and delivering software and services. Cloud Computing is basically a collection of resources and services of computation integrated together and is provided to the end users on pay-as-needed basis. cloud computing is a well know structured model that provides services, where resources and data are retrieved from cloud service provider through a platform of internet web-based tools and application. As multiple users of the cloud generates multiple request for resources present on the cloud which may cause a deadlock. So in order to avoid deadlocks on the cloud it is important to divide the loads generated, of all the VMs among themselves. Load balancing actually means the same. So the aim of this paper is to discuss load balancing and have a comparative study of different load balancing algorithms and there implementations.
Key-Words / Index Term
Load Balancing, Cloud computing, Data centers , Resource allocation
References
[1] Seyed Mohssen Ghafari, Mahdi Fazeli, Ahmad Patooghy, Leila Rikhtechi, “Bee-MMT: A Load Balancing Method for Power Consumption Management in Cloud Computing,” in proc. 6th International Conference on Contemporary Computing (IC3), IEEE, pp. 76-80, August 2013
[2] Shridhar G. Domanal, G. Ram Mohana Reddy, “Load Balancing in Cloud Computing Using Modified Throttled Algorithm,” in proc. International Conference on Cloud Computing in Emerging Markets (CCEM), IEEE, pp. 1-7, October 2013.
[3] A. Salman, “Particle Swarm Optimization for Task Assignment Problem,” Microprocessors and Microsystems, pp. 363-371, Nov 2002.
[4] Abhijit A Rajguru, S.S. Apte, “A Comparative Performance Analysis of Load Balancing Algorithms In Distributed Systems Using Qualitative Parameters”, International Journal of Recent Technology and Engineering, Vol. 1, Issue 3, August 2012
[5] David Escalnte and Andrew J. Korty, “Cloud Services: Policy and Assessment”, EDUCAUSE Review, Vol. 46, July/August 2011.
[6] JianzheTai,JueminZhang,JunLi,WaleedMeleis and NingfangMi “A R A: Adaptive Resource Allocation for Cloud Computing Environments under Bursty Workloads” 978-1-4673-0012-4/11 ©2011 IEEE.
Citation
Shaivya Jindal, Neeta Sharma, "Load Balancing on the Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1235-1237, 2018.
Search Engine Optimization Using Local Language
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1238-1239, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12381239
Abstract
Search engine optimization (SEO) is the process of affecting the visibility of a website or a web page in a search engine`s "natural" or un-paid ("organic") search results. In general, higher ranked search results always appear in very beginning of first page of search results and they get more frequent clicks than any other. SEO may have executions for different kinds of search, including image search, local search, video search, news search, etc. In this review paper need of local language search engine optimization discussed.
Key-Words / Index Term
Search Engine Optimization, Informative search engine, Use of local language, Ranking, Natural search
References
[1] Beel, Jöran and Gipp, Bela and Wilde, Erik (2010). "Academic Search Engine Optimization (ASEO): Optimizing Scholarly Literature for Google Scholar and Co.". Luo, Longyan, and Yong Wang. "Status and development strategies of Chinese travel search engines." Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International. Vol. 2. IEEE, 2011.
[2] Killoran, John B. "How to use search engine optimization techniques to increase website visibility." IEEE Transactions on professional communication 56.1 (2013): 50-66.
[3] Eswarawaka, Rajesh, et al. "The analysis on search engine optimization supported by six sigma methodology." Innovative Mechanisms for Industry Applications (ICIMIA), 2017 International Conference on. IEEE, 2017.
[4] Krrabaj, Samedin, Fesal Baxhaku, and Dukagjin Sadrijaj. "Investigating search engine optimization techniques for effective ranking: A case study of an educational site." Embedded Computing (MECO), 2017 6th Mediterranean Conference on. IEEE, 2017.
[5] Gupta, Swati, et al. "Search engine optimization: Success factors." Parallel, Distributed and Grid Computing (PDGC), 2016 Fourth International Conference on. IEEE, 2016.
[6] Journal of Scholarly Publishing. pp. 176–190. Retrieved April 18, 2010.
[7] Sun, Ke, et al. "Foxinfo1. 0: A Chinese Topic-Oriented Search Engine." Asian Language Processing, 2009. IALP`09. International Conference on. IEEE, 2009.
[8] Chhabra, Surbhi, Ravi Mittal, and Darothi Sarkar. "Inducing factors for search engine optimization techniques: A comparative analysis." Information Processing (IICIP), 2016 1st India International Conference on. IEEE, 2016.
[9] Yang, Man, Jianwei Li, and Xuerong Gou. "The research of Chinese word segmentation strategy in educational resources search engine based on lucene." Advanced Intelligence and Awareness Internet (AIAI 2011), 2011 International Conference on. IET, 2011.
[10] Scott, Matthew R., Xiaohua Liu, and Ming Zhou. "Towards a Specialized Search Engine for Language Learners [Point of View]." Proceedings of the IEEE 99.9 (2011): 1462-1465.
Citation
Hemang Desai, Birajkumar V. Patel, "Search Engine Optimization Using Local Language," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1238-1239, 2018.
A Study About Implementation of CSRF Attacks
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1240-1243, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12401243
Abstract
Today worldwide revolution in web application technology is changing our lives in term of the way we learn and use. Web applications fit into this because the technology has been around long enough and can provide benefits for development in this area. The main objective of this paper is to study about the CSRF attacks and implement these attacks in real world and check the success rate of these attacks. The CSRF attacks are the state changing attacks not the data stealing attacks. In this paper also discussed how various tools and frameworks that are helpful to perform the CSRF attacks works. The implementation technique of CSRF attack is discussed in fully detail. One can easily learn and understand the CSRF attacks and its implementation using this paper.
Key-Words / Index Term
Cross-Site Request Forgery, Log analysis, CSRF Attacks, Implementation of CSRF
References
[1]. CSRF Attacks, XSRF or Sea-Surf. (n.d.). Retrieved from https://www.acunetix.com/websitesecurity/csrf-attacks/
[2]. Getting Started With Burp Suite. (n.d.). Retrieved from https://portswigger.net/burp/help/suite_gettingstarted
[3]. K. Goseva-Popstojanova, G. A. (2012). Classification of malicious web sessions. Retrieved from 21st International Conference on Computer Communications and Networks (ICCCN): http://dx.doi.org/10.1109/ICCCN.2012.6289291
[4]. Kali Linux Tutorials. (n.d.). Retrieved from https://www.kali.org/category/tutorials/
[5]. M. Auxilia, D. T. (2010). "Anomaly detection using negative security model in web application". Retrieved from International Conference on Computer Information Systems and Industrial Management Applications (CISIM): http://dx.doi.org/10.1109/CISIM.2010.5643461
[6]. M. Zolotukhin, T. Hämäläinen, T. Kokkonen, J. Siltanen. (2014). "Analysis of http requests for anomaly detection of web attacks". Retrieved from IEEE 12th International Conference on Dependable, Autonomic and Secure Computing: http://dx.doi.org/10.1109/DASC.2014.79
[7]. Merve Bas, Seyyar Ferhat, Özgür Çatak Ensar Gül. (2017). "Detection of attack-targeted scans from the Apache HTTP Server access logs". Retrieved from Applied Computing and Informatics: https://www.sciencedirect.com/science/article/pii/S2210832717300169
[8]. N. Singh, A. Jain, R.S. Raw, R. Raman. (2014). "Detection of Web-Based Attacks by Analyzing Web Server Log Files". Retrieved from Springer India: http://dx.doi. org/10.1007/978-81-322-1665-0_10
[9]. OWASP Zed Attack Proxy Project. (n.d.). Retrieved from https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
Citation
Kamaljeet Kumar, "A Study About Implementation of CSRF Attacks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1240-1243, 2018.
An Efficient Image Encryption Technique using Discretized Baker Map in Shearlet Domain
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1244-1251, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12441251
Abstract
An image encryption plays a significant role in various multimedia applications. An efficient image encryption technique using Discretized Baker Map and Shearlet transform is proposed. Initially, shearlet transform is used to convert an input image into sub-bands. Thereafter, Discretized Baker Map is utilized to design pseudo-random key that encrypts the coefficients of sub-bands. In the end, inverse of Shearlet transform is used to evaluate the ciphered image. Extensive analysis show that the proposed technique outperforms existing techniques in terms of entropy, correlation analysis, and differential analysis.
Key-Words / Index Term
Image Encryption, Discretized Baker Map, Shearlet Transform, Security
References
[1] M. Kaur and V. Kumar, "Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain," in IET Image Processing, vol. 12, no. 7, pp. 1273-1283, 7 2018a.
[2] M. Kaur and V. Kumar, "Efficient image encryption method based on improved Lorenz chaotic system," in Electronics Letters, vol. 54, no. 9, pp. 562-564, 5 3 2018b.
[3] J. Wang, Q. H. Wang and Y. Hu, "Image Encryption Using Compressive Sensing and Detour Cylindrical Diffraction," in IEEE Photonics Journal, vol. 10, no. 3, pp. 1-14, June 2018.
[4] X. Q. Fu, B. C. Liu, Y. Y. Xie, W. Li and Y. Liu, "Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos," in IEEE Photonics Journal, vol. 10, no. 3, pp. 1-15, June 2018.
[5] Z. Gao, D. Chen, W. Zhang and S. Cai, "Colour image encryption algorithm using one-time key and FrFT," in IET Image Processing, vol. 12, no. 4, pp. 472-478, 4 2018.
[6] C. Zhu and K. Sun, "Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps," in IEEE Access, vol. 6, pp. 18759-18770, 2018.
[7] S. Sun, "A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling," in IEEE Photonics Journal, vol. 10, no. 2, pp. 1-14, April 2018.
[8] M. Preishuber, T. Hütter, S. Katzenbeisser and A. Uhl, "Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption," in IEEE Transactions on Information Forensics and Security, vol. 13, no. 9, pp. 2137-2150, Sept. 2018.
[9] X. Wang, X. Zhu and Y. Zhang, "An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map," in IEEE Access, vol. 6, pp. 23733-23746, 2018.
[10] L. Liu, S. Hao, J. Lin, Z. Wang, X. Hu and S. Miao, "Image block encryption algorithm based on chaotic maps," in IET Signal Processing, vol. 12, no. 1, pp. 22-30, 2 2018.
[11] Y. Zhang, "A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm," in Chinese Journal of Electronics, vol. 26, no. 5, pp. 1022-1031, 9 2017.
[12] A. Abd El-Latif, B. Abd-El-Atty and M. Talha, "Robust Encryption of Quantum Medical Images," in IEEE Access, vol. 6, pp. 1073-1081, 2018.
[13] L. Bao, S. Yi and Y. Zhou, "Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing," in IEEE Transactions on Image Processing, vol. 26, no. 12, pp. 5618-5631, Dec. 2017.
[14] C. Li, D. Lin and J. Lü, "Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits," in IEEE MultiMedia, vol. 24, no. 3, pp. 64-71, 2017.
[15] D. Kong, L. Cao, X. Shen, H. Zhang and G. Jin, "Image Encryption Based on Interleaved Computer-Generated Holograms," in IEEE Transactions on Industrial Informatics, vol. 14, no. 2, pp. 673-678, Feb. 2018.
[16] H. Liu, A. Kadir and X. Sun, "Chaos-based fast colour image encryption scheme with true random number keys from environmental noise," in IET Image Processing, vol. 11, no. 5, pp. 324-332, 4 2017.
[17] L. Liu, S. Miao, H. Hu and M. Cheng, "N-phase logistic chaotic sequence and its application for image encryption," in IET Signal Processing, vol. 10, no. 9, pp. 1096-1104, 12 2016.
[18] X. Wu, B. Zhu, Y. Hu and Y. Ran, "A Novel Color Image Encryption Scheme Using Rectangular Transform-Enhanced Chaotic Tent Maps," in IEEE Access, vol. 5, pp. 6429-6436, 2017.
[19] H. Huang and S. Yang, "Colour image encryption based on logistic mapping and double random-phase encoding," in IET Image Processing, vol. 11, no. 4, pp. 211-216, 4 2017.
[20] L. Y. Zhang et al., "On the Security of a Class of Diffusion Mechanisms for Image Encryption," in IEEE Transactions on Cybernetics, vol. 48, no. 4, pp. 1163-1175, April 2018.
[21] X. Wang, G. Zhou, C. Dai and J. Chen, "Optical Image Encryption With Divergent Illumination and Asymmetric Keys," in IEEE Photonics Journal, vol. 9, no. 2, pp. 1-8, April 2017.
[22] J. Hou, R. Xi, P. Liu and T. Liu, "The switching fractional order chaotic system and its application to image encryption," in IEEE/CAA Journal of Automatica Sinica, vol. 4, no. 2, pp. 381-388, April 2017.
[23] Y. Abanda and A. Tiedeu, "Image encryption by chaos mixing," in IET Image Processing, vol. 10, no. 10, pp. 742-750, 10 2016.
[24] Y. Xie, J. Li, Z. Kong, Y. Zhang, X. Liao and Y. Liu, "Exploiting Optics Chaos for Image Encryption-Then-Transmission," in Journal of Lightwave Technology, vol. 34, no. 22, pp. 5101-5109, Nov.15, 15 2016.
[25] B. Murugan and A. G. Nanjappa Gounder, "Image encryption scheme based on block-based confusion and multiple levels of diffusion," in IET Computer Vision, vol. 10, no. 6, pp. 593-602, 9 2016.
[26] A. M. Elshamy et al., "Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding," in Journal of Lightwave Technology, vol. 31, no. 15, pp. 2533-2539, Aug.1, 2013.
[27] H. Kawaguchi, "Evaluation of the Lorentz group Lie algebra map using the Baker-Cambell-Hausdorff formula," in IEEE Transactions on Magnetics, vol. 35, no. 3, pp. 1490-1493, May 1999.
[28] J. F. van Diejen, "The dynamics of zeros of the solitonic Baker-Akhiezer function for the Toda chain," in International Mathematics Research Notices, vol. 2000, no. 5, pp. 253-270, 2000.
[29] Ye, Guodong, and Xiaoling Huang. "Spatial image encryption algorithm based on chaotic map and pixel frequency." Science China Information Sciences 61, no. 5 (2018): 058104.
[30] Teng, Lin, Xingyuan Wang, and Juan Meng. "A chaotic color image encryption using integrated bit-level permutation." Multimedia Tools and Applications 77, no. 6 (2018): 6883-6896.
[31] Ghebleh, M., A. Kanso, and D. Stevanović. "A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation." Multimedia Tools and Applications 77, no. 6 (2018): 7305-7326.
[32] Ran, Qiwen, Ling Wang, Jing Ma, Liying Tan, and Siyuan Yu. "A quantum color image encryption scheme based on coupled hyper-chaotic Lorenz system with three impulse injections." Quantum Information Processing 17, no. 8 (2018): 188.
Citation
Tarlok Singh, Pammy Manchanda, "An Efficient Image Encryption Technique using Discretized Baker Map in Shearlet Domain," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1244-1251, 2018.
Novel insights into Cryptovirology : A Comprehensive Study
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1252-1255, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12521255
Abstract
Cryptography is presently used for defensive purposes. Ciphers are used against passive attackers. Public key algorithms are used against an active attacker in man-in-the-middle attack. Digital signature is used for defending against a forger. E-cash systems are used against a counterfeiter and a double-spender. Pseudorandom bit generators are used against a next-bit predictor. Crypto virology is used for locating failures of protocols and vulnerabilities in design. For defending purpose Forward engineering is used.
Key-Words / Index Term
Cryptography, Cryptovirology, Public Key, Security, Cryptovirus, FIPS, PKCS
References
[1]Barth, B. California ransomware bill supported by Hollywood hospital passes committee. SC Magazine (Apr. 13, 2016).
[2] Christensen, C. The Innovator’s Solution: Creating and Sustaining Successful Growth. Harvard Business School Press, 2003.
[3] Eisler, B. Fault Line. Ballantine Books, 2009.
[4] Santayana, G. Reason in Common Sense, (1905), p. 284, volume 1 of The Life of Reason.
[5] Scott, R. Alien. 20 th Century Fox, 1979.
[6] U.S. Dept. of Health and Human Services. FACT SHEET: Ransomware and HIPAA; http://bit.ly/29zm57B
[7] Volz, D. and Auchard, E. More disruptions feared from cyber attack; Microsoft slams government secrecy. Reuters (May 15, 2017).
[8] Young, A. and Yung, M. Cryptovirology: Extortion- based security threats and countermeasures. In Proceedings of the IEEE Symposium on Security and Privacy, (1996), 129–140.
[9] Young, A. and Yung, M. Malicious cryptography— Exposing cryptovirology. Wiley, 2004.
Citation
Manas Kumar Yogi, S. .Lakshmi Aparna, "Novel insights into Cryptovirology : A Comprehensive Study," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1252-1255, 2018.
Cloud Based Framework for Ethiopian Personal Health Record System
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1256-1260, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12561260
Abstract
Cloud based Framework for Ethiopian Personal Health Record system is a proposed application, which creates, stores and manages patient medical records and allows access at anytime from anywhere through cloud computing. PHR is broadly considered as means by which an individual’s personal health information can be collected, stored, and used for diverse health management purposes. It contains medication and treatment history that includes patients medical history, diagnosis, treatment plans, immunization data, allergies, radiology images, laboratory and test results. PHR can be managed, shared, and controlled by an individual or their care-givers and healthcare providers. The main intention of PHR is to have access to evidence-based tools that healthcare providers can use to make a decision and disease diagnosis about the patients care delivery. In this work we develop Personal Health Records (PHR) to integrate with the healthcare providers all over Ethiopia and to implement it with the cloud infrastructure. The main challenges that are addressed in this work are data storage, use of data analytics tool for decision making, data privacy, and the data security.
Key-Words / Index Term
Personal Health Record, Cloud Computing, Healthcare Provider, Patient, Medication History
References
[1] World Health Organization (2012), “Management of patient information: trends and challenges in Member States: based on the findings of the second global survey on eHealth”, (Global Observatory for eHealth Series, v. 6).
[2] Yohannes Kinfu, Mario R Dal Poz, Hugo Mercer and David B Evans(2009), “The health worker shortage in Africa: are enough physicians and nurses being trained?”, Bull World Health Organ, Vol.87, pp.25–230, 2009.
[3] Rajkumar, B., Yeo, C.S., and Venugopal, S., “Market- oriented Cloud Computing: Vision, hype, and reality for delivering IT services as computing utilities.” Proceedings of the 10th IEEE International Conference on High Performance Computing and Communication, 2008.
[4] Stuti Nathaniel, Anand Motwani and Arpit saxena, “Cloud based Predictive Model for Detection of ‘Chronic Kidney Disease’ Risk”, International Journal of Computer Sciences and Engineering, Vol.6(4), Apr 2018.
[5] Mahammad Shafi, R.Mengistu Ketema and Prabhakar Gantela (2017), “Personal Health Record of an Individual in Ethiopia”, Global Journals Inc. (USA) Volume 17 Issue 3 Version 1.0 Year2017.
[6] R. Kavitha*, E. Kannan and S. Kotteswaran (2016), “Implementation of Cloud based Electronic Health Record (EHR) for Indian Healthcare Needs”, Indian Journal of Science and Technology, Vol 9(3), DOI: 10.17485/ijst/2016/v9i3/86391, January 2016.
[7] Bizuayehu Gernet Demsash (2012), “Framework to Adopt Cloud Computing for Medical Image Archiving and Sharing”, Addis Ababa university, Ethiopia.
[8] Alem Wassie (2017), “Design an Electronic Medical Record System at Outpatient Department of Yekatit 12 Hospital Medical College”, Addis Ababa university, Ethiopia.
[9] Shruthi Suresh, “Encryption Schemes for Securing Cloud-based PHR Systems”, International Journal of Computer Sciences and Engineering, Vol.-2(12), PP (6-10) Dec 2014.
[10] Welderufael Gebeyehu (2011), “Factors Affecting Access and Disclosure Practices of Personal Health Information in Public Hospitals, Addis Ababa, Ethiopia”, Addis Ababa university, Ethiopia.
[11] Anteneh Aklilu (2012), “Need Assessment Framework for Electronic Health Record Management System in Ethiopia”, Addis Ababa university, Ethiopia.
Citation
Rakeb Daba Tugie, Gagandeep, "Cloud Based Framework for Ethiopian Personal Health Record System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1256-1260, 2018.
Analysis of ThinFilms Applications and Deposition Processes
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1261-1266, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12611266
Abstract
The numerous applications of modern surface and thin-film technology appear in all aspects of everyday life. They are necessary for products such as compact disks, solar cells, heat-protection glass, or in modern production systems, e.g. for machining. Although their process technology is costly, physical vacuum coating systems are common for producing functional thin films on an industrial scale. In order to appreciate thin film device applications, it is essential to understand what thin films are, what makes them so attractive for applications, and how they are prepared and characterized. This paper Analyze the brief review of salient and relevant features of the thin-films applications and thin-film deposition process.
Key-Words / Index Term
Thin-films, Deposition, Applications, Physical& Chemical process.
References
[1]. Pushparaj V. L, Manikoth S. M., Kumar A., Murugesan S., Ci L., Vajtai R., Linhardt R. J., Nalamasu O., Ajayan P. M.."Flexible Nanocomposite Thin Film Energy Storage Devices". Proceedings of the NationalAcademy of Science USA 104, 13574-13577, 2007.Retrieved 2010-08-08.
[2]. Hu, L. C., J.; Yang, Y.; La Mantia, F.; Jeong, S.; Cui,Y. Highly Conductive Paper for Energy Storage. Proc. Natl. Acad. Sci.U.S.A. 2009, 106, 21490–21494.
[3]. Beyond Batteries: Storing Power in a Sheet of Paper". RPI. August 13, 2007. Retrieved 2008-01-15.
[4]. Paper battery offers future power". BBC News. August 14, 2007. Retrieved 2008-01-15
[5].Katherine Noyes. "Nanotubes Power Paper-Thin Battery". TechNewsWorld. Retrieved 2010-10
[6]Ng, S. H. W., J.; Guo, Z. P.; Chen, J.; Wang, G. X.;Liu, H. K. Single Wall Carbon Nanotube Paper asAnode for Lithium-Ion Battery. Electrochim. Acta 2005, 51, 23–28.
[7]Hu, L.; Hecht, D.; Gru¨ ner, G. Carbon Nanotube Thin Films: Fabrications, Properties, and Applications. Chem. Rev.2010, doi: 10.1021/cr9002962.
Citation
S. Saravanan, "Analysis of ThinFilms Applications and Deposition Processes," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1261-1266, 2018.
Adhoc Network – Energy Efficient Networking in XOR and Random Linear Network Coding
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1267-1270, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12671270
Abstract
RLNC-based broadcasting and introduce an analytical model that captures the performance of coding-based broadcast schemes. This paper proposes a new design a novel RLNC-based broadcast algorithm that for the first time applies RLNC over CDS-based broadcasting. The proposed algorithm provides a more systematic pruning of redundant transmissions without compromising RLNC’s efficiency. We also investigate generation management that is a key issue in RLNC and introduce a new distributed scheme that is suitable for mobile environments. Finally, through extensive simulations, we show that the proposed algorithm outperforms XOR-based as well as RLNC-based schemes even when global knowledge is used for managing packet generations.
Key-Words / Index Term
References
[1] A. Vahdat, D. Becker, et al., “Epidemic routing for partially connected ad hoc networks,” in Duke University, CS-200006,2000.
[2] D. Miorandi, S. Sicari, F. D. Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497 – 1516, 2012.
[3] D. G. Reina, S. L. Toral, F. Barrero, N. Bessis, and E. Asimakopoulou, “The role of ad hoc networks in the internet of things: A case scenario for smart environments,” in Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence (N. Bessis, F. Xhafa, D. Varvarigou, R. Hill, and M. Li, eds.), pp. 89–113, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
[4] P. Bellavista, G. Cardone, A. Corradi, and L. Foschini, “Convergence of manet and wsn in iot urban scenarios,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3558– 3567, 2013.
[5] G. Fanti, Y. B. David, S. Benthall, E. Brewer, and S. Shenker, “Rangzen: Circumventing government-imposed communication blackouts,” University of California, Berkeley, Tech. Rep. UCB/EECS-2013-128, 2013.
[6] F. Rebecchi, M. D. de Amorim, V. Conan, A. Passarella, R. Bruno, and M. Conti, “Data offloading techniques in cellular networks: A survey,” IEEE Communications Surveys Tutorials, vol. 17, no. 2, pp. 580–603, 2015.
[7] M. Conti and S. Giordano, “Mobile ad hoc networking: milestones, challenges, and new research directions,” IEEE Communications Magazine, vol. 52, no. 1, pp. 85–96, 2014.
[8] V. F. Mota, F. D. Cunha, D. F. Macedo, J. M. Nogueira, and A. A. Loureiro, “Protocols, mobility models and tools in opportunistic networks: A survey,” Computer Communications, vol. 48, pp. 5 – 19, 2014.
[9] B. Williams and T. Camp, “Comparison of Broadcasting Techniques for Mobile Ad Hoc Networks,” in ACM Proc. Int. Symp. Mobile Ad Hoc Networking & Computing (MobiHoc), pp. 194–205, 2002.
[10] P. Ruiz and P. Bouvry, “Survey on Broadcast Algorithms for Mobile Ad Hoc Networks,” ACM Comput. Surv., vol. 48, no. 1, pp. 8:1–8:35, 2015.
[11] I. Stojmenovic and J. Wu, “Broadcasting and activity scheduling in ad hoc networks,” in Mobile Ad Hoc Networking (S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, eds.), ch. 7, pp. 205–229, Wiley-IEEE Press, 2005.
[12] O. Liang, Y. A. Sekercioglu, and N. Mani, “A survey of multipoint relay based broadcast schemes in wireless ad hoc networks,” IEEE Communications Surveys & Tutorials, vol. 8, no. 4, pp. 30–46, 2006.
[13] D. Reina, S. Toral, P. Johnson, and F. Barrero, “A survey on probabilistic broadcast schemes for wireless ad hoc networks,” Ad Hoc Networks, vol. 25, Part A, pp. 263 – 292, 2015.
[14] M. Abolhasan, T. Wysocki, and E. Dutkiewicz, “A review of routing protocols for mobile ad hoc networks,” Elsevier Ad hoc Networks, vol. 2, no. 1, pp. 1–22, 2004.
[15] A. Boukerche, B. Turgut, N. Aydin, M. Z. Ahmad, L. Bölöni, and D. Turgut, “Routing protocols in ad hoc networks: A survey,” Computer Networks, vol. 55, no. 13, pp. 3032 – 3080, 2011.
Citation
N. Thangamani, "Adhoc Network – Energy Efficient Networking in XOR and Random Linear Network Coding," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1267-1270, 2018.