Search results for: light weight encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7484

Search results for: light weight encryption

7394 Influence of Alccofine on Semi-Light Weight Concrete under Accelerated Curing and Conventional Curing Regimes

Authors: P. Parthiban, J. Karthikeyan

Abstract:

This paper deals with the performance of semi-light weight concrete, prepared by using wood ash pellets as coarse aggregates which were improved by partial replacement of cement with alccofine. Alccofine is a mineral admixture which contains high glass content obtained through the process of controlled granulation. This is finer than cement which carries its own pozzolanic property. Therefore, cement could be replaced by alccofine as 0%, 5%, 10%, 15%, 20%, 25%, 30%, 35%, 40%, 45%, 50%, 55%, 60%, 65%, and 70% to enhance the strength and durability properties of concrete. High range water reducing admixtures (HRWA) were used in these mixes which were dosed up to 1.5% weight of the total cementitious content (alccofine & cement). It also develops the weaker transition zone into more impermeable layer. Specimens were subjected in both the accelerated curing method as well as conventional curing method. Experimental results were compared and reported, in that the maximum compressive strength of 32.6 MPa was achieved on 28th day with 30% replacement level in a density of 2200 kg/m3 to a conventional curing, while in the accelerated curing, maximum compressive strength was achieved at 40% replacement level. Rapid chloride penetration test (RCPT) output results for the conventional curing method at 0% and 70% give 3296.7 and 545.6 coulombs.

Keywords: Alccofine, compressive strength, RCPT, wood ash pellets

Procedia PDF Downloads 182
7393 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe

Authors: Ejd Garba, Okike Benjamin

Abstract:

Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.

Keywords: arithmetic, cyber space, modulo-2, information security

Procedia PDF Downloads 320
7392 Improving Cheon-Kim-Kim-Song (CKKS) Performance with Vector Computation and GPU Acceleration

Authors: Smaran Manchala

Abstract:

Homomorphic Encryption (HE) enables computations on encrypted data without requiring decryption, mitigating data vulnerability during processing. Usable Fully Homomorphic Encryption (FHE) could revolutionize secure data operations across cloud computing, AI training, and healthcare, providing both privacy and functionality, however, the computational inefficiency of schemes like Cheon-Kim-Kim-Song (CKKS) hinders their widespread practical use. This study focuses on optimizing CKKS for faster matrix operations through the implementation of vector computation parallelization and GPU acceleration. The variable effects of vector parallelization on GPUs were explored, recognizing that while parallelization typically accelerates operations, it could introduce overhead that results in slower runtimes, especially in smaller, less computationally demanding operations. To assess performance, two neural network models, MLPN and CNN—were tested on the MNIST dataset using both ARM and x86-64 architectures, with CNN chosen for its higher computational demands. Each test was repeated 1,000 times, and outliers were removed via Z-score analysis to measure the effect of vector parallelization on CKKS performance. Model accuracy was also evaluated under CKKS encryption to ensure optimizations did not compromise results. According to the results of the trail runs, applying vector parallelization had a 2.63X efficiency increase overall with a 1.83X performance increase for x86-64 over ARM architecture. Overall, these results suggest that the application of vector parallelization in tandem with GPU acceleration significantly improves the efficiency of CKKS even while accounting for vector parallelization overhead, providing impact in future zero trust operations.

Keywords: CKKS scheme, runtime efficiency, fully homomorphic encryption (FHE), GPU acceleration, vector parallelization

Procedia PDF Downloads 23
7391 Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme

Authors: Cavidan Yakupoglu, Kurt Rohloff

Abstract:

In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here.

Keywords: lattice cryptography, fully homomorphic encryption, parameter selection, LWE, RLWE

Procedia PDF Downloads 155
7390 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 93
7389 A Study of Light in Zoroastrianism and Ancient Iranian Traditions: A Case of Mathnavi

Authors: Farideh Aramideh

Abstract:

The aim of this essay is to study the light in Zoroastrianism, and Masnavi by Rumi. The use of light goes back to thousand years B.C. the light in the legacy of ancient Iranian wisdom has been used in Mithraism, Zurvanism, Zoroastrianism and Manichaean religion and spirituality has been emanated in the world through the light. Ontology and angelology and the sacredness of fire in Zoroastrianism have been interpreted according to the concept of light. The ruling atmosphere on mazdaism world is the world which is full of light and angels, and light is one of the basis of worldview in ancient Iranian mysticism, especially Zoroastrianism and Manichaean, continued widely in Islamic mysticism, and also it always provokes discussions among scholars and mystics especially Iranian mystics. Light and fire are used as the signs and symbols of God's existence, The Shining lights emanated from the sacred essence of God, knowledge, and mysticism, love, discovering the wisdom and a way to God. Rumi speaks eloquently about light in Masnavi, and by using the light; he could render his readers the fundamental mystic subjects such as the true existence of God, the verity of prophets and saints, intuition of God, spiritual states of union with God and abiding in God, which are the most complicated mystic terms.

Keywords: zoroastrianism, myticims, Masnavi, light

Procedia PDF Downloads 298
7388 The Combined Influences of Salinity, Light and Nitrogen Limitation on the Growth and Biochemical Composition of Nannochloropsis sp. and Tetraselmis sp., Isolated from Penang National Park Coastal Waters, Malaysia

Authors: Mohamed M. Alsull

Abstract:

In the present study, two microalgae species “Nannochloropsis sp. and Tetraselmis sp.” isolated from Penang National Park coastal waters, Malaysia; were cultivated under combined various laboratory conditions “salinity, light, nitrogen limitation and starvation”. Growth rate, dry weight, chlorophyll a content, total lipid and protein contents, were estimated at mid exponential growth phase. Both Nannochloropsis sp. and Tetraselmis sp. showed remarkable decrease in growth rate, chlorophyll a content and protein content companied with increase in lipid content under nitrogen limitation and starvation conditions. Maintaining Nannochloropsis sp. under salinity 15‰ caused only significant decrease in total protein content; while Tetraselmis sp. grown at the same salinity caused decrease in the growth rate, chlorophyll a, dry weight and total protein content only when nitrogen was available.

Keywords: biochemical composition, light, microalgae, nitrogen limitation, salinity

Procedia PDF Downloads 427
7387 Comparative Transcriptome Profiling of Low Light Tolerant and Sensitive Rice Varieties Induced by Low Light Stress at Active Tillering Stage

Authors: Darshan Panda, Lambodar Behera, M. J. Baig, Sudhanshu Sekhar

Abstract:

Low light intensity is a significant limitation for grain yield and quality in rice. However, yield is not significantly reduced in low-light tolerant rice varieties. The work, therefore, planned for comparative transcriptome profiling under low light stress to decipher the genes involved and molecular mechanism of low light tolerance in rice. At the active tillering stage, 50% low light exposure for one day, three days, and five days were given to Swarnaprabha (low light tolerant) and IR8 (low light sensitive) rice varieties. Illumina (HiSeq) platform was used for transcriptome sequencing. A total of 6,652 and 12,042 genes were differentially expressed due to low light intensity in Swarnaprabha and IR8, respectively, as compared to control. CAB, LRP, SBPase, MT15, TF PCL1, and Photosystem I & II complex related gene expressions were mostly increased in Swarnaprabha upon the longer duration of low light exposure, which was not found in IR8 as compared to control. Their expressions were validated by qRT-PCR. The overall study suggested that the maintenance of grain yield in the tolerant variety under low light might be the result of accelerated expression of the genes, which enable the plant to keep the photosynthetic processes moving at the same pace even under low light.

Keywords: rice, low light, photosynthesis, yield

Procedia PDF Downloads 194
7386 PUF-Based Lightweight Iot Secure Authentication Chip Design

Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He

Abstract:

This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.

Keywords: PUF, IoT, authentication, secure communication, encryption, XOR

Procedia PDF Downloads 141
7385 Effects of Bed Type, Corm Weight and Lifting Time on Quantitative and Qualitative Criteria of Saffron (Crocus sativus L.)

Authors: A. Mollafilabi, A. Koocheki, P. Rezvani Moghaddam, M. Nassiri Mahalati

Abstract:

In order to study the effects of corm weights and times of corm lifting saffron in different planting beds, an experiment was conducted as Factorial layout based on a Randomized Complete Block Design with three replications at the Fadak Research Center of Agricultural Research in Food Science during 2010. Treatments were two corm weights (8-10, 10 < g), two planting beds (stone wool and peat moss) and five levels of lifting time (mi-June, early July, mid-July, early August and mid-August). No. of corms were 457 corms.m-2 and for 40 days and were stored for 90 days in incubation, 85% relative humidity and 25°C temperature in the darkness. Then, saffron corms were transferred to growth chamber with 17 °C in 8 hours light and 16 hours darkness. Characteristics were number of flower, fresh weight of flower, dry weight of flower, fresh and dry weight of stigma, fresh and dry weight of style, fresh and dry weight of stigma+style and Picrocrocin, Safronal and Crocin contents of saffron were measured. Results showed that the corm weight, bed type and time of corm lifting had significant effects on economical yield of saffron such as picked flowers, dry weight of stigma and fresh weight of flowers. The highest saffron economical yield was obtained in interaction of corm weight, 10 g, peat moss and lifting time in mid-June as much as 5.2 g.m-2. This yield is 11 fold of average yield of Iranian farms. Picrocrocin, Safranal and Crocin contents was graded as excellent thread in peat moss under controlled conditions compared with ISO Standard of 203.

Keywords: corm density, dry stigma, safranal-flowering, yield saffron

Procedia PDF Downloads 333
7384 Packet Fragmentation Caused by Encryption and Using It as a Security Method

Authors: Said Rabah Azzam, Andrew Graham

Abstract:

Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.

Keywords: fragmentation, encryption, security, switch

Procedia PDF Downloads 336
7383 Weight Comparison of Oil and Dry Type Distribution Transformers

Authors: Murat Toren, Mehmet Çelebi

Abstract:

Reducing the weight of transformers while providing good performance, cost reduction and increased efficiency is important. Weight is one of the most significant factors in all electrical machines, and as such, many transformer design parameters are related to weight calculations. This study presents a comparison of the weight of oil type transformers and dry type transformer weight. Oil type transformers are mainly used in industry; however, dry type transformers are becoming more widespread in recent years. MATLAB is typically used for designing transformers and design parameters (rated voltages, core loss, etc.) along with design in ANSYS Maxwell. Similar to other studies, this study presented that the dry type transformer option is limited. Moreover, the commonly-used 50 kVA distribution transformers in the industry are oil type and dry type transformers are designed and considered in terms of weight. Currently, the preference for low-cost oil-type transformers would change if costs for dry-type transformer were more competitive. The aim of this study was to compare the weight of transformers, which is a substantial cost factor, and to provide an evaluation about increasing the use of dry type transformers.

Keywords: weight, optimization, oil-type transformers, dry-type transformers

Procedia PDF Downloads 354
7382 Synthesis and Characterization of Nano-Alumina Using Neem Oil as the Template for Efficient Hydrogen Generation via Photo-Hydrolysis of Sodium Borohydride

Authors: Dina M. Abd El-Aty, D. Aman, E. G. Zaki, Heba M. Salem

Abstract:

A friendly environmental source of energy as hydrogen was produced by photo-hydrolysis of hydrogen storage material as sodium borohydride (NaBH4), which is non-toxic and stores a high percentage of hydrogen. The photoreaction was produced under visible light and nano-alumina as a catalyst. In this study, we use more economical and friendly environmental oil as a template to produce a nano-catalyst. The prepared catalyst was characterized by X-Ray diffraction, N2-adsorption-desorption, Fourier Transforms Infrared, Scanning Electron microscope and X-Ray Photoelectron Spectroscopy. Different parameters such as catalyst weight, NaBH4 weight and time of irradiation were studied to obtain a highly efficient photo-hydrolysis reaction. The reaction is pseudo-first order and the hydrogen production rate was determined as 1500 ml min-1 g-1 at the optimum conditions.

Keywords: photo-reaction, nano-alumina, hydrogen production, sodium borohydride, visible light

Procedia PDF Downloads 83
7381 The Problem of Now in Special Relativity Theory

Authors: Mogens Frank Mikkelsen

Abstract:

Special Relativity Theory (SRT) includes only one characteristic of light, the speed is equal to all observers, and by excluding other relevant characteristics of light, the common interpretation of SRT should be regarded as merely an approximative theory. By rethinking the iconic double light cones, a revised version of SRT can be developed. The revised concept of light cones acknowledges an asymmetry of past and future light cones and introduced a concept of the extended past to explain the predictions as something other than the future. Combining this with the concept of photon-paired events, led to the inference that Special Relativity theory can support the existence of Now.

Keywords: relativity, light cone, Minkowski, time

Procedia PDF Downloads 85
7380 Weight Gain After Total Thyroidectomy

Authors: Yong Seong Kim, Seongbin Hong, So Hun Kim, Moonsuk Nam

Abstract:

Background: Patients who undergo thyroidectomy due to thyroid cancer often complain weight gain, although they are on suppressive thyroid hormone treatment. The aim of this study is to know whether thyroid cancer patients gain the weight after thyroidectomy and weight change is dependent on estrogen state or use of rhTSH. Material and Method: We performed a retrospective chart review of subjects receiving medical care at an academic medical center. Two hundred two patients who underwent total thyroidectomy were included. As a control group, patients with thyroid nodule and euthyroidism were matched for age, gender, menopausal status. The weight changes occurring over first one year and thyroid function were assessed. Results: Mean age was 51±12 years and patients was composed with 38% of premenopausal, 15 % perimenopausal women, 37% of postmenopausal women and 20% of men. Patients with thyroid cancer gained 2.2 kg during the first year. It’ was not significantly different with control. However, weigh change in perimenopausal and post menopausal women gained more weight than control (P <0.05). Age, baseline body weight and weight gain were not correlated. Discussion: Patient who had undergone thyroidectomy gained more weight than their control, especially in peri- and postmenopausal women. Patients in this age should be monitored for their weight carefully.

Keywords: weight gain, thyroidectomy, thyroid cancer, weight chance

Procedia PDF Downloads 416
7379 Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map

Authors: Hongmin Deng, Qionghua Wang

Abstract:

A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).

Keywords: chaos encryption, logistic map, pseudo-random sequence, RFID

Procedia PDF Downloads 401
7378 A New Car-Following Model with Consideration of the Brake Light

Authors: Zhiyuan Tang, Ju Zhang, Wenyuan Wu

Abstract:

In this research, a car-following model with consideration of the status of the brake light is proposed. The numerical results show that the stability of the traffic flow is improved. The ability of the brake light to reduce car accident is also showed.

Keywords: brake light, car-following model, traffic flow, regional planning, transportation

Procedia PDF Downloads 579
7377 Genetics of Birth and Weaning Weight of Holstein, Friesians in Sudan

Authors: Safa A. Mohammed Ali, Ammar S. Ahamed, Mohammed Khair Abdalla

Abstract:

The objectives of this study were to estimate the means and genetic parameters of birth and weaning weight of calves of pure Holstein-Friesian cows raised in Sudan. The traits studied were:*Weight at birth *Weight at weaning. The study also included some of the important factors that affected these traits. The data were analyzed using Harvey’s Least Squares and Maximum Likelihood programme. The results obtained showed that the overall mean weight at birth of the calves under study was 34.36±0.94kg. Male calves were found to be heavier than females; the difference between the sexes was highly significant (P<0.001). The mean weight at birth of male calves was 34.27±1.17 kg while that of females was 32.51±1.14kg. The effect of sex of calves, sire and parity of dam were highly significant (P<0.001). The overall mean of weight at weaning was 67.10 ± 5.05 kg, weight at weaning was significantly (p<0.001) effected by sex of calves, sire, year and season of birth have highly significant (P<0.001) effect on either trait. Also estimates heritabilities of birth weight was (0.033±0.015) lower than heritabilities of weaning weight (0.224±0.039), and genetic correlation was 0.563, the phenotypic correlation 0.281, and the environmental correlation 0.268.

Keywords: birth, weaning, weight, friesian

Procedia PDF Downloads 665
7376 Security in Resource Constraints: Network Energy Efficient Encryption

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.

Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC

Procedia PDF Downloads 145
7375 Amorphous Silicon-Based PINIP Structure for Human-Like Photosensor

Authors: Sheng-Chuan Hsu

Abstract:

Because the existing structure of ambient light sensor is most silicon photodiode device, it is extremely sensitive in the red and infrared regions. Even though the IR-Cut filter had added, it still cannot completely eliminate the influence of infrared light, and the spectral response of infrared light was stronger than that of the human eyes. Therefore, it is not able to present the vision spectrum of the human eye reacts with the ambient light. Then it needs to consider that the human eye feels the spectra that show significant differences between light and dark place. Consequently, in practical applications, we must create and develop advanced device of human-like photosensor which can solve these problems of ambient light sensor and let cognitive lighting system to provide suitable light to achieve the goals of vision spectrum of human eye and save energy.

Keywords: ambient light sensor, vision spectrum, cognitive lighting system, human eye

Procedia PDF Downloads 335
7374 Corrosion Analysis and Interfacial Characterization of Al – Steel Metal Inert Gas Weld - Braze Dissimilar Joints by Micro Area X-Ray Diffraction Technique

Authors: S. S. Sravanthi, Swati Ghosh Acharyya

Abstract:

Automotive light weighting is of major prominence in the current times due to its contribution in improved fuel economy and reduced environmental pollution. Various arc welding technologies are being employed in the production of automobile components with reduced weight. The present study is of practical importance since it involves preferential substitution of Zinc coated mild steel with a light weight alloy such as 6061 Aluminium by means of Gas Metal Arc Welding (GMAW) – Brazing technique at different processing parameters. However, the fabricated joints have shown the generation of Al – Fe layer at the interfacial regions which was confirmed by the Scanning Electron Microscope and Energy Dispersion Spectroscopy. These Al-Fe compounds not only affect the mechanical strength, but also predominantly deteriorate the corrosion resistance of the joints. Hence, it is essential to understand the phases formed in this layer and their crystal structure. Micro area X - ray diffraction technique has been exclusively used for this study. Moreover, the crevice corrosion analysis at the joint interfaces was done by exposing the joints to 5 wt.% FeCl3 solution at regular time intervals as per ASTM G 48-03. The joints have shown a decreased crevice corrosion resistance with increased heat intensity. Inner surfaces of welds have shown severe oxide cracking and a remarkable weight loss when exposed to concentrated FeCl3. The weight loss was enhanced with decreased filler wire feed rate and increased heat intensity. 

Keywords: automobiles, welding, corrosion, lap joints, Micro XRD

Procedia PDF Downloads 123
7373 Encryption Image via Mutual Singular Value Decomposition

Authors: Adil Al-Rammahi

Abstract:

Image or document encryption is needed through e- government data base. Really in this paper we introduce two matrices images, one is the public, and the second is the secret (original). The analyses of each matrix is achieved using the transformation of singular values decomposition. So each matrix is transformed or analyzed to three matrices say row orthogonal basis, column orthogonal basis, and spectral diagonal basis. Product of the two row basis is calculated. Similarly the product of the two column basis is achieved. Finally we transform or save the files of public, row product and column product. In decryption stage, the original image is deduced by mutual method of the three public files.

Keywords: image cryptography, singular values decomposition

Procedia PDF Downloads 436
7372 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba E. J. D.

Abstract:

The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.

Keywords: merged irregular transposition, error level, model estimation, message splitting

Procedia PDF Downloads 314
7371 Modified Design of Flyer with Reduced Weight for Use in Textile Machinery

Authors: Payal Patel

Abstract:

Textile machinery is one of the fastest evolving areas which has an application of mechanical engineering. The modular approach towards the processing right from the stage of cotton to the fabric, allows us to observe the result of each process on its input. Cost and space being the major constraints. The flyer is a component of roving machine, which is used as a part of spinning process. In the present work using the application of Hyper Works, the flyer arm has been modified which saves the material used for manufacturing the flyer. The size optimization of the flyer is carried out with the objective of reduction in weight under the constraints of standard operating conditions. The new design of the flyer is proposed and validated using the module of HyperWorks which is equally strong, but light weighted compared to the existing design. Dynamic balancing of the optimized model is carried out to align a principal inertia axis with the geometric axis of rotation. For the balanced geometry of flyer, air resistance is obtained theoretically and with Gambit and Fluent. Static analysis of the balanced geometry has been done to verify the constraint of operating condition. Comparison of weight, deflection, and factor of safety has been made for different aluminum alloys.

Keywords: flyer, size optimization, textile, weight

Procedia PDF Downloads 215
7370 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages

Authors: Okike Benjamin, E. J. D. Garba

Abstract:

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.

Keywords: information security, message splitting, pattern, sequence

Procedia PDF Downloads 289
7369 BAN Logic Proof of E-passport Authentication Protocol

Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana

Abstract:

E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.

Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic

Procedia PDF Downloads 435
7368 Enhanced Traffic Light Detection Method Using Geometry Information

Authors: Changhwan Choi, Yongwan Park

Abstract:

In this paper, we propose a method that allows faster and more accurate detection of traffic lights by a vision sensor during driving, DGPS is used to obtain physical location of a traffic light, extract from the image information of the vision sensor only the traffic light area at this location and ascertain if the sign is in operation and determine its form. This method can solve the problem in existing research where low visibility at night or reflection under bright light makes it difficult to recognize the form of traffic light, thus making driving unstable. We compared our success rate of traffic light recognition in day and night road environments. Compared to previous researches, it showed similar performance during the day but 50% improvement at night.

Keywords: traffic light, intelligent vehicle, night, detection, DGPS

Procedia PDF Downloads 325
7367 Factors Associated with Weight Loss Maintenance after an Intervention Program

Authors: Filipa Cortez, Vanessa Pereira

Abstract:

Introduction: The main challenge of obesity treatment is long-term weight loss maintenance. The 3 phases method is a weight loss program that combines a low carb and moderately high-protein diet, food supplements and a weekly one-to-one consultation with a certified nutritionist. Sustained weight control is the ultimate goal of phase 3. Success criterion was the minimum loss of 10% of initial weight and its maintenance after 12 months. Objective: The aim of this study was to identify factors associated with successful weight loss maintenance after 12 months at the end of 3 phases method. Methods: The study included 199 subjects that achieved their weight loss goal (phase 3). Weight and body mass index (BMI) were obtained at the baseline and every week until the end of the program. Therapeutic adherence was measured weekly on a Likert scale from 1 to 5. Subjects were considered in compliance with nutritional recommendation and supplementation when their classification was ≥ 4. After 12 months of the method, the current weight and number of previous weight-loss attempts were collected by telephone interview. The statistical significance was assumed at p-values < 0.05. Statistical analyses were performed using SPSS TM software v.21. Results: 65.3% of subjects met the success criterion. The factors which displayed a significant weight loss maintenance prediction were: greater initial percentage weight loss (OR=1.44) during the weight loss intervention and a higher number of consultations in phase 3 (OR=1.10). Conclusion: These findings suggest that the percentage weight loss during the weight loss intervention and the number of consultations in phase 3 may facilitate maintenance of weight loss after the 3 phases method.

Keywords: obesity, weight maintenance, low-carbohydrate diet, dietary supplements

Procedia PDF Downloads 150
7366 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment

Authors: Y. Xu, L. Xiong, Z. Xu

Abstract:

In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.

Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing

Procedia PDF Downloads 485
7365 Stray Light Reduction Methodology by a Sinusoidal Light Modulation and Three-Parameter Sine Curve Fitting Algorithm for a Reflectance Spectrometer

Authors: Hung Chih Hsieh, Cheng Hao Chang, Yun Hsiang Chang, Yu Lin Chang

Abstract:

In the applications of the spectrometer, the stray light that comes from the environment affects the measurement results a lot. Hence, environment and instrument quality control for the stray reduction is critical for the spectral reflectance measurement. In this paper, a simple and practical method has been developed to correct a spectrometer's response for measurement errors arising from the environment's and instrument's stray light. A sinusoidal modulated light intensity signal was incident on a tested sample, and then the reflected light was collected by the spectrometer. Since a sinusoidal signal modulated the incident light, the reflected light also had a modulated frequency which was the same as the incident signal. Using the three-parameter sine curve fitting algorithm, we can extract the primary reflectance signal from the total measured signal, which contained the primary reflectance signal and the stray light from the environment. The spectra similarity between the extracted spectra by this proposed method with extreme environment stray light is 99.98% similar to the spectra without the environment's stray light. This result shows that we can measure the reflectance spectra without the affection of the environment's stray light.

Keywords: spectrometer, stray light, three-parameter sine curve fitting, spectra extraction

Procedia PDF Downloads 248