Search results for: real-time voice encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 684

Search results for: real-time voice encryption

414 Adaptive Data Approximations Codec (ADAC) for AI/ML-based Cyber-Physical Systems

Authors: Yong-Kyu Jung

Abstract:

The fast growth in information technology has led to de-mands to access/process data. CPSs heavily depend on the time of hardware/software operations and communication over the network (i.e., real-time/parallel operations in CPSs (e.g., autonomous vehicles). Since data processing is an im-portant means to overcome the issue confronting data management, reducing the gap between the technological-growth and the data-complexity and channel-bandwidth. An adaptive perpetual data approximation method is intro-duced to manage the actual entropy of the digital spectrum. An ADAC implemented as an accelerator and/or apps for servers/smart-connected devices adaptively rescales digital contents (avg.62.8%), data processing/access time/energy, encryption/decryption overheads in AI/ML applications (facial ID/recognition).

Keywords: adaptive codec, AI, ML, HPC, cyber-physical, cybersecurity

Procedia PDF Downloads 68
413 Blockchain-Based Assignment Management System

Authors: Amogh Katti, J. Sai Asritha, D. Nivedh, M. Kalyan Srinivas, B. Somnath Chakravarthi

Abstract:

Today's modern education system uses Learning Management System (LMS) portals for the scoring and grading of student performances, to maintain student records, and teachers are instructed to accept assignments through online submissions of .pdf,.doc,.ppt, etc. There is a risk of data tampering in the traditional portals; we will apply the Blockchain model instead of this traditional model to avoid data tampering and also provide a decentralized mechanism for overall fairness. Blockchain technology is a better and also recommended model because of the following features: consensus mechanism, decentralized system, cryptographic encryption, smart contracts, Ethereum blockchain. The proposed system ensures data integrity and tamper-proof assignment submission and grading, which will be helpful for both students and also educators.

Keywords: education technology, learning management system, decentralized applications, blockchain

Procedia PDF Downloads 63
412 An Anthropological Reading of the Italian Shockumentary Mondo Cane: Whiteness Made Visible and Racial Discourses

Authors: Claudia Pisano

Abstract:

The Italian shockumentary Mondo cane (1962), directed by Gualtiero Jacopetti, Paolo Cavara, and Franco Prosperi, has often been criticized for its supposed racist and colonialist stances. Several critics consider it a film that proclaims, without explicitly mentioning it, the superiority of the white Euro-American individual over the people who do not belong to white-western societies. This paper proposes a different interpretation of the way in which Mondo cane engages with the discourse of race. Through an analysis of crucial scenes and of the relationship between images and voice-over, and through a comparison between the representation of non-white societies in Mondo cane and in some popular Italian newsreels of the 50s-60s, such as 'La Settimana Incom' and 'Mondo Libero,' the paper argues that Mondo cane debunks the western-white superiority that, according to some critics, the film would promote. The continuous and rapid alternance of scenes set in the western world, for example in Europe or in the United States, and scenes set in exotic countries inhabited by non-white peoples highlights the commonalities between these far-away realities, rather than pointing out the superiority of the white-western one. In addition, the subtle irony employed by the voice-over distances Mondo cane from the newsreels that it much resembles for its documentary style. Mondo cane’s treatment and representation of race is analyzed in the light of the work of Australian Aboriginal anthropologist Aileen Moreton-Robinson, which is based on key concepts such as whiteness and whiteness invisibility. Whiteness is defined as the invisible and omnipresent norm based on which everything that does not belong to the white world is labeled as an odd and inferior 'other.' To overcome racial discrimination, it is necessary to make whiteness visible; that is to say, to deprive it of that aura of normalcy and unquestionable righteousness that surrounds it. This essay argues that Mondo cane participates in the process of making whiteness visible through the confrontation of the white people with the visible 'other'. Because the film shows that the common features on which this confrontation is based are violence and bestiality, the paper suggests that the film does not support the idea of the white world being superior to the non-white; on the contrary, it underlines that the entire world is characterized by the same shocking savagery.

Keywords: irony, race, shockumentary, whiteness, whiteness invisibility

Procedia PDF Downloads 114
411 A Voice Retrieved from the Holocaust in New Journalism in Kazuo Ishiguro's the Remains of the Day

Authors: Masami Usui

Abstract:

Kazuo Ishiguro’s The Remains of the Day (1989) underlines another holocaust, an imprisonment of human life, dignity, and self in the globalizing sphere of the twentieth century. The Remains of the Day delineates the invisible and cruel space of “lost and found” in the postcolonial and post-imperial discourse of this century, that is, the Holocaust. The context of the concentration camp or wartime imprisonment such as Auschwitz is transplanted into the public sphere of modern England, Darlington Hall. The voice is retrieved and expressed by the young journalist and heir of Darlington Hall, Mr. David Cardinal. The new media of journalism is an intruder at Darlington Hall and plays a role in revealing the wrongly-input ideology. “Lost and Found” consists of the private and public retrieved voices. Stevens’ journey in 1956 is a return to the past, especially the period between 1935 and 1936. Lost time is retrieved on his journey; yet lost life cannot be revived entirely in his remains of life. The supreme days of Darlington Hall are the terrifying days caused by the Nazis. Fascism, terrorism, and militarism destroyed the wholesomeness of the globe. Into blind Stevens, both Miss Kenton and Mr. Cardinal bring out the common issue, that is, the political conflicts caused by Nazis. Miss Kenton expresses her own ideas against anti-Semitism regarding the Jewish maids in the crucial time when Sir Oswald Mosley’s Blackshirts organization attacked the Anglo Jews between 1935 and 1936. Miss Kenton’s half-muted statement is reinforced and assured by Cardinal in his mention of the 1934 Olympic Rally threatened by Mosley’s Blackshirts. Cardinal’s invasion of Darlington Hall embodies the increasing tension of international politics related to World War II. Darlington Hall accommodates the crucial political issue that definitely influences the fate of the house, its residents, and the nation itself and that is retrieved in the newly progressive and established media.

Keywords: modern English literature, culture studies, communication, history

Procedia PDF Downloads 564
410 Design of Bidirectional Wavelength Division Multiplexing Passive Optical Network in Optisystem Environment

Authors: Ashiq Hussain, Mahwash Hussain, Zeenat Parveen

Abstract:

Now a days the demand for broadband service has increased. Due to which the researchers are trying to find a solution to provide a large amount of service. There is a shortage of bandwidth because of the use of downloading video, voice and data. One of the solutions to overcome this shortage of bandwidth is to provide the communication system with passive optical components. We have increased the data rate in this system. From experimental results we have concluded that the quality factor has increased by adding passive optical networks.

Keywords: WDM-PON, optical fiber, BER, Q-factor, eye diagram

Procedia PDF Downloads 491
409 Analysis of Delivery of Quad Play Services

Authors: Rahul Malhotra, Anurag Sharma

Abstract:

Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice, and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.

Keywords: FTTH, quad play, play service, access networks, data rate

Procedia PDF Downloads 393
408 Analysis of Network Performance Using Aspect of Quantum Cryptography

Authors: Nisarg A. Patel, Hiren B. Patel

Abstract:

Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).

Keywords: cryptography, networking, quantum, encryption and decryption

Procedia PDF Downloads 167
407 Egg Yolk Peptide Stimulated Osteogenic Gene Expression

Authors: Hye Kyung Kim, Myung-Gyou Kim, Kang-Hyun Leem

Abstract:

Postmenopausal osteoporosis is characterized by low bone density which leads to increased bone fragility and greater susceptibility to fracture. Current treatments for osteoporosis are dominated by drugs that inhibit bone resorption although they also suppress bone formation that may contribute to pathogenesis of osteonecrosis. To restore the extensive bone loss, there is a great need for anabolic treatments that induce osteoblasts to build new bone. Pre-osteoblastic cells produce proteins of the extra-cellular matrix, including type I collagen at first, and then to successively produce alkaline phosphatase (ALP) and osteocalcin during differentiation to osteoblasts. Finally, osteoblasts deposit calcium. Present study investigated the effects of egg yolk peptide (EYP) on osteogenic activities and bone matrix gene expressions in human osteoblastic MG-63 cells. The effects of EYP on cell proliferation, alkaline phosphatase (ALP) activity, collagen synthesis, and mineralization were measured. The expression of osteogenic genes including COL1A1 (collagen, type I, alpha 1), ALP, BGLAP (osteocalcin), and SPP1 (secreted phosphoprotein 1, osteopontin) were measured by quantitative realtime PCR. EYP dose-dependently increased MG-63 cell proliferation, ALP activity, collagen synthesis, and calcium deposition. Furthermore, COL1A1, ALP, and SPP1 gene expressions were increased by EYP treatment. Present study suggested that EYP treatment enhanced osteogenic activities and increased bone matrix osteogenicgenes. These results could provide a mechanistic explanation for the bone-strengthening effects of EYP.

Keywords: egg yolk peptide, osteoblastic MG-63 cells, alkaline phosphatase, collagen synthesis, osteogenic genes, COL1A1, osteocalcin, osteopontin

Procedia PDF Downloads 376
406 Investigation of Delivery of Triple Play Service in GE-PON Fiber to the Home Network

Authors: Anurag Sharma, Dinesh Kumar, Rahul Malhotra, Manoj Kumar

Abstract:

Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.

Keywords: BER, PON, TDMPON, GPON, CWDM, OLT, ONT

Procedia PDF Downloads 715
405 Baring Witness, Bearing Withness: Paradoxes of Testimony in J.M. Coetzee’s Waiting for the Barbarians

Authors: Alexandra Sweny

Abstract:

This paper contends with the intersection between the act of witnessing and the act of reading in order to consider the relevance of literary testimony and fiction as tools for postcolonial readings of history. J. M. Coetzee's Waiting for the Barbarians elucidates what Primo Levi deems the 'paradoxical' task of testimony: that suffering can only be fully narrated by the sufferer themselves, whose voice and narrative capacity is often foreclosed by the very extent of their trauma. By examining the fictional Magistrate's position as both a reader and translator of history, this paper posits Waiting for the Barbarians as an ethical command against the appropriation of trauma.

Keywords: ethical criticism, limit-experience, postcolonialism, psychic trauma in literature, testimony

Procedia PDF Downloads 137
404 Management and Agreement Protocol in Computer Security

Authors: Abdulameer K. Hussain

Abstract:

When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).

Keywords: agreement parameters, key agreement, key exchange, security management

Procedia PDF Downloads 410
403 Acoustic Analysis of Psycho-Communication Disorders within Moroccan Students

Authors: Brahim Sabir

Abstract:

Psycho-Communication disorders negatively affect the academic curriculum for students in higher education. Thus, understanding these disorders, their causes and effects will give education specialists a tool for the decision, which will lead to the resolution of problems related to the integration of students with Psycho-Communication disorders. It is in this context that a statistical study was conducted, targeting the population object of study, namely Moroccan students. Pathological voice samples were recorded and analyzed acoustically with PRAAT software, in order to build a model that will be the basis for the objective diagnostic.

Keywords: psycho-communication disorders, acoustic analysis, PRAAT

Procedia PDF Downloads 379
402 Using the Cluster Computing to Improve the Computational Speed of the Modular Exponentiation in RSA Cryptography System

Authors: Te-Jen Chang, Ping-Sheng Huang, Shan-Ten Cheng, Chih-Lin Lin, I-Hui Pan, Tsung- Hsien Lin

Abstract:

RSA system is a great contribution for the encryption and the decryption. It is based on the modular exponentiation. We call this system as “a large of numbers for calculation”. The operation of a large of numbers is a very heavy burden for CPU. For increasing the computational speed, in addition to improve these algorithms, such as the binary method, the sliding window method, the addition chain method, and so on, the cluster computer can be used to advance computational speed. The cluster system is composed of the computers which are installed the MPICH2 in laboratory. The parallel procedures of the modular exponentiation can be processed by combining the sliding window method with the addition chain method. It will significantly reduce the computational time of the modular exponentiation whose digits are more than 512 bits and even more than 1024 bits.

Keywords: cluster system, modular exponentiation, sliding window, addition chain

Procedia PDF Downloads 509
401 An Ecological Reading of Indian Regional Literature: A Comparative Ecocritical Analysis of Punjabi Poet Shiv Kumar Batalvi and Surjit Patar's Poetry

Authors: Zameerpal Kaur

Abstract:

Ecocriticism comes into existence in 1990s, it tries to explore the relationship of literature with the natural world and further it examines the role that natural surroundings and environment play in the minds of the creative writers during their imagination and creative process. The present study is an attempt to focus on the comparative ecocritical analysis of Shiv Kumar Batalvi and Surjit Patar’s selected poetry in the theoretical framework of ecocriticism in order to shed light on the poet’s vigilant views about the relationship of human life and nature. Shiv Kumar Batalvi is a renowned modern Punjabi poet. He is essentially a poet of nature and love. His opinions towards nature support his position to be considered as a major representative of recent environmental issues and ecocritical concerns in Punjabi literature. He is one of the most outstanding modern Punjabi poets, is endowed with the most artistic temperament in whose poetry nature always has a dominating existence. He seems to consciously portray the scenes of natural surroundings into his poetry; in fact the titles of his poems in themselves signify his love for the nature. Surjit Patar, an imminent modern Punjabi poet tries to present a different picture of nature into his poems; he also uses to write poems about contemporary problems. Surjit Patar’s radical quarrel with the modern cultural context makes him reject all the absolutes and finalities in the form of transcendental reason and religion, history and evolution, he freely writes about the deterioration of nature at selfish materialistic society. He is modern poet who weaves the natural imagery with the syntax of his poems. Patar’s work reflects a universal voice that is dribbled with nuanced humanism and a sense of modernity that seemed neither dated, nor trapped in regional boundaries. Through his poetry he has given a voice to the fragile, disrupting borders, disturbing the status quo. An attempt to analyse the poetic works of above said poets from ecocritical perspective as well as especially focussing on various aspects of ecocriticism like ecocentric ethics, ecoaesthetics, anthropomorphism etc. has been made throughout the comparative study of the selected works.

Keywords: anthropocentrism, degradation, environment and literature, nature

Procedia PDF Downloads 455
400 Effective Communication Within Workplace: Key to Growth of Business

Authors: Mamta

Abstract:

Communication is the mixture of the various activities such as words, body language, volume and voice tone. Mankind has always throughout its history had the necessity for communication. It starts from birth and continues throughout life. Communication is just the right means of success and advancement in a workplace. Communication is one of the means to connect to different people at far distances. The modern workplace is inherently collaborative, and this collaboration relies on effective communication among co-workers. Also it has been observed that a lack in good communication skills especially within a workplace can result in conflicts and chaos hence hindering the productivity of an organization. Thus there is a dire need for developing good and effective communication skills which will result in increase in productivity and will enhance its efficiency.

Keywords: communication skills, professional communication, workplace communication, workplace efficiency

Procedia PDF Downloads 446
399 The Role of Parents in Special Education in the Maldives: Teachers' Voice

Authors: Fathimath Warda, Mariyam Nihaadh

Abstract:

Students with Special Education Needs (SEN) are increasing in the Maldives, like anywhere else in the world, due to the changes in lifestyle of the people and ease of being diagnosed with advancements in medical health. With the growth in the population of these students, the demand for professionals in various fields is unmet. Thus, with the introduction of the Inclusive Education Policy in 2013, all students are educated in the same classroom by the regular teacher. This poses problems as the teachers are not well trained and qualified to meet the varying needs of the students, given the limited time and the large number of students in the classroom. This is a major concern for all stakeholders in the education sector and research has been conducted by various local scholars in this area. However, studies on the role of parents of such students is an area that remains yet to be explored in the Maldives, which makes a study of this nature crucial. The main aim of this study is to determine the ways in which the education provided to Special Needs Students can be maximized for a better outcome. Therefore, the study intends to understand the involvement of parents in providing education to special needs students from the teachers' perspectives. The basis for this study is the Parent Development Theory developed by Mowder, which was initially known as Parent Role Development Theory. A qualitative research has thus been utilised for the purpose of the study as it requires to find the beliefs and attitudes of teachers, along with relevant justifications regarding the role of parents in educating students with special needs. Data was gathered using one-to-one interviews, as it is one of the most reliable ways of getting meaningful and in-depth data. The study employs a total of 8 participants who are teachers teaching in inclusive classes where students with special needs are included. Emphasis was paid to select teachers who have the experience of teaching students with different disorders commonly found in the Maldives, namely in the four areas, Autism Spectrum Disorder, Down Syndrome, Attention Deficit Hyperactive Disorder and speech impairment. Hence, purposive sampling will be used to select the participants. Data analysis has been done using thematic coding. The findings revealed that teachers highlighted that parents' involvement was a key factor in ensuring success of education in children with special needs. Thus, the study concludes that the role of parents as a necessary input for the proper development of children and in educating children with special needs, suggesting that extra measures have to be taken develop a positive relationship between teachers and parents in order to strengthen this aspect.

Keywords: involvement, parents' role, special education needs, teachers' voice

Procedia PDF Downloads 124
398 Review Paper on an Algorithm Enhancing Privacy and Security in Online Meeting Platforms Using a Secured Encryption

Authors: Tonderai Muchenje, Mkhatshwa Phethile

Abstract:

Humans living in this current situation know that communication with one another is necessary for themselves. There are many ways to communicate with each other; during unexpected natural disasters and outbreak of epidemics and pandemics, the need for online meeting platforms are considered most important. Apparently, the development in the telecommunication sector also played an important role. Therefore, the epidemic of the Covid-19 Pandemic and the new normal situation resulted in the overwhelming production of online meeting platforms to prevent the situation. This software is commonly used in business communications in the beginning. Rapidly the COVID-19 pandemic changed the situation. At present-day, these virtual meeting applications are not only used to have informal meetings with friends and relatives but also to be used to have formal meetings in the business and education (universities) sector. In this article, an attempt has been made to list out the useful secured ways for using online meeting platforms.

Keywords: virtual background, zoom, secure online algorithm, RingCentral, Pexip Pexip, TeamViewer, microsoft teams

Procedia PDF Downloads 99
397 Children's Literature As Pedagogy: Lessons For Literacy Practice

Authors: Alicia Curtin, Kathy Hall

Abstract:

This paper explores research and practice shared on a masters University module entitled Children's Literature as Pedagogy. Issues explored include the meaning of childhood and literature; the definition of what counts as text, textual and literacy practice for children and adolescents. A sociocultural framework is used to define literacy practice from this perspective and student voice and experience remains central. Lessons from classroom experience and the use of innovative, multi modal and non traditional texts and pedagogical approaches are offered as examples of innovative and inclusive pedagogy in the field of literacy practice.

Keywords: non traditional, pedagogy, practice, sociocultural

Procedia PDF Downloads 571
396 Network Traffic Classification Scheme for Internet Network Based on Application Categorization for Ipv6

Authors: Yaser Miaji, Mohammed Aloryani

Abstract:

The rise of recent applications in everyday implementation like videoconferencing, online recreation and voice speech communication leads to pressing the need for novel mechanism and policy to serve this steep improvement within the application itself and users‟ wants. This diversity in web traffics needs some classification and prioritization of the traffics since some traffics merit abundant attention with less delay and loss, than others. This research is intended to reinforce the mechanism by analysing the performance in application according to the proposed mechanism implemented. The mechanism used is quite direct and analytical. The mechanism is implemented by modifying the queue limit in the algorithm.

Keywords: traffic classification, IPv6, internet, application categorization

Procedia PDF Downloads 548
395 Study on Clarification of the Core Technology in a Monozukuri Company

Authors: Nishiyama Toshiaki, Tadayuki Kyountani, Nguyen Huu Phuc, Shigeyuki Haruyama, Oke Oktavianty

Abstract:

It is important to clarify the company’s core technology in product development process to strengthen their power in providing technology that meets the customer requirement. QFD method is adopted to clarify the core technology through identifying the high element technologies that are related to the voice of customer, and offer the most delightful features for customer. AHP is used to determine the importance of evaluating factors. A case study was conducted by using this approach in Japan’s Monozukuri Company (so called manufacturing company) to clarify their core technology based on customer requirements.

Keywords: core technology, QFD, voices of customer, analysis procedure

Procedia PDF Downloads 371
394 זכור (Remember): An Analysis of Art as a Reflection of Sexual and Gendered Violence against Jewish Women during the Pogroms (1919-1920S) And the Nazi Era (1933-1943)

Authors: Isabella B. Davidman

Abstract:

Violence used against Jewish women in both the Eastern European pogroms and during the Nazi era was specifically gendered, targeting their female identity and dignity of womanhood. Not only did these acts of gendered violence dehumanize Jewish women, but they also hurt the Jewish community as a whole. The devastating sexual violence that women endured during the pogroms and the Nazi era caused profound trauma. Out of shame and fear, silence about women’s experiences of sexual abuse manifests in forms that words cannot translate. Women have turned to art and other means of storytelling to convey their female experiences in visual and non-verbal ways. Therefore, this paper aims to address the historical accounts of gendered violence against Jewish women during the pogroms and Nazi era, as well as art that reflects upon the female experience, in order to understand the emotional impact resulting from these events. To analyze the artwork, a feminist analysis was used to understand the intersection of gender with the other systems of inequality, such as systemic anti-semitism, in women’s lives; this ultimately explained the ways in which cultural productions undermine and reinforce the political and social oppression of women by exploring how art confronts the exploitation of women's bodies. By analyzing the art in the context of specific acts of violence, such as public rape, as a strategic weapon, we are able to understand women’s experiences and how these experiences, in turn, challenged their womanhood. Additionally, these atrocities, which often occurred in the public space, were dismissed and forgotten due to the social stigma of rape. In this sense, the experiences of women in pogroms and the Nazi era were both highly unacknowledged and forgotten. Therefore, the art that was produced during those time periods, as well as those after those events, gives voice to the profound silence on the narratives of Jewish women. Sexual violence is a weapon of war used to cause physical and psychological destruction, not only as a product of war. In both the early twentieth-century pogroms and the Holocaust, the sexual violence that Jewish women endured was fundamentally the same: the rape of Jewish women became a focal target in the theater of violence– women were not raped because they were women, but specifically, because they were Jewish women. Although the events of the pogroms and the Holocaust are in the past, the art that serves as testimony to the experience of Jewish women remains an everlasting reminder of the gendered violence that occurred. Even though covert expressions, such as an embroidered image of a bird eating an apple, the artwork gives voice to the many silenced victims of sexualized and gendered violence.

Keywords: gendered violence, holocaust, Nazi era, pogroms

Procedia PDF Downloads 92
393 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 334
392 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 673
391 Developing a Shared Understanding of Wellbeing: An Exploratory Study in Irish Primary Schools Incorporating the Voices of Teachers

Authors: Fionnuala Tynan, Margaret Nohilly

Abstract:

Wellbeing in not only a national priority in Ireland but in the international context. A review of the literature highlights the consistent efforts of researchers to define the concept of wellbeing. This study sought to explore the understating of Wellbeing in Irish primary schools. National Wellbeing Guidelines in the Irish context frame the concept of wellbeing through a mental health paradigm, which is but one aspect of wellbeing. This exploratory research sought the views of Irish primary-school teachers on their understanding of the concept of wellbeing and the practical application of strategies to promote wellbeing both in the classroom and across the school. Teacher participants from four counties in the West of Ireland were invited to participate in focus group discussion and workshops through the Education Centre Network. The purpose of this process was twofold; firstly to explore teachers’ understanding of wellbeing in the primary school context and, secondly, for teachers to be co-creators in the development of practical strategies for classroom and whole school implementation. The voice of the teacher participants was central to the research design. The findings of this study indicate that the definition of wellbeing in the Irish context is too abstract a definition for teachers and the focus on mental health dominates the discourse in relation to wellbeing. Few teachers felt that they were addressing wellbeing adequately in their classrooms and across the school. The findings from the focus groups highlighted that while teachers are incorporating a range of wellbeing strategies including mindfulness and positive psychology, there is a clear disconnect between the national definition and the implementation of national curricula which causes them concern. The teacher participants requested further practical strategies to promote wellbeing at whole school and classroom level within the framework of the Irish Primary School Curriculum and enable them to become professionally confident in developing a culture of wellbeing. In conclusion, considering wellbeing is a national priority in Ireland, this research promoted the timely discussion the wellbeing guidelines and the development of a conceptual framework to define wellbeing in concrete terms for practitioners. The centrality of teacher voices ensured the strategies proposed by this research is both practical and effective. The findings of this research have prompted the development of a national resource which will support the implementation of wellbeing in the primary school at both national and international level.

Keywords: primary education, shared understanding, teacher voice, wellbeing

Procedia PDF Downloads 440
390 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 136
389 Performance Analysis of Next Generation OCDM-RoF-Based Hybrid Network under Diverse Conditions

Authors: Anurag Sharma, Rahul Malhotra, Love Kumar, Harjit Pal Singh

Abstract:

This paper demonstrates OCDM-ROF based hybrid architecture where data/voice communication is enabled via a permutation of Optical Code Division Multiplexing (OCDM) and Radio-over-Fiber (RoF) techniques under various diverse conditions. OCDM-RoF hybrid network of 16 users with DPSK modulation format has been designed and performance of proposed network is analyzed for 100, 150, and 200 km fiber span length under the influence of linear and nonlinear effect. It has been reported that Polarization Mode Dispersion (PMD) has the least effect while other nonlinearity affects the performance of proposed network.

Keywords: OCDM, RoF, DPSK, PMD, eye diagram, BER, Q factor

Procedia PDF Downloads 622
388 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data

Authors: Devika Tanna

Abstract:

'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.

Keywords: adaptive algorithm, database, host images, privacy, visual cryptography

Procedia PDF Downloads 114
387 Unsupervised Reciter Recognition Using Gaussian Mixture Models

Authors: Ahmad Alwosheel, Ahmed Alqaraawi

Abstract:

This work proposes an unsupervised text-independent probabilistic approach to recognize Quran reciter voice. It is an accurate approach that works on real time applications. This approach does not require a prior information about reciter models. It has two phases, where in the training phase the reciters' acoustical features are modeled using Gaussian Mixture Models, while in the testing phase, unlabeled reciter's acoustical features are examined among GMM models. Using this approach, a high accuracy results are achieved with efficient computation time process.

Keywords: Quran, speaker recognition, reciter recognition, Gaussian Mixture Model

Procedia PDF Downloads 368
386 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 209
385 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long

Abstract:

Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.

Keywords: decryption, encryption, elliptic curve, greater common divisor

Procedia PDF Downloads 238