Communication is one of the vast and rapidly growing fields of engineering, where
increasing the efficiency of communication by overcoming the external
electromagnetic sources and noise is considered a challenging task. To achieve
confidentiality for color image transmission over the noisy communication channels
a proposed algorithm is presented for image encryption using AES algorithm. This
algorithm combined with error detections using Cyclic Redundancy Check (CRC) to
preserve the integrity of the encrypted data. This paper presents an error detection
method uses Cyclic Redundancy Check (CRC), the CRC value can be generated by
two methods: Serial and Parallel CRC Implementation. The proposed algorithm for
the encryption and error detection using parallel CRC64 (Slicing-by-4 algorithm)
implementation with multiple look table approach for the encrypted image. The goal
of the proposed algorithm optimizes the size of the redundant bits needed to attach
to the original data for the purpose of error detection; this reduction is considered
necessary to meet the restriction for some computer architectures. Furthermore, it is
suitable for implementing in software rather than in hardware. The proposed
algorithm uses different tested images by added different noise ratios (1% and 5%)
of total images size to study the noise effect on the encrypted images. The noise
added on single and multi bits position and study the effect on the output results.
The obtained results shown that the small size of the image the large CRC64
affected by noise while the large size of image yields a stable or fixed number of
affected CRC64.
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreThe transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show MoreEbastine (EBS) is a non-sedating antihistamine with a long duration of action. This drug has predominantly hydrophobic property causing a low solubility and low bioavailability. Surface solid dispersions (SSD) is an effective technique for improving the solubility and dissolution rate of poorly soluble drugs by using hydrophilic water insoluble carriers.
The present study aims to enhance the solubility and dissolution rate of EBS by using surface solid dispersion technique. Avicel® PH101, Avicel® PH 102, croscarmellose sodium(CCS) and sodium starch glycolate(SSG) were used as water insoluble hydrophilic carriers.
The SSD formulations of EBS were prepared by the solvent evaporation method in different drug: carrier
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreBackground: Severe acute respiratory syndrome coronavirus 2 (SARS-Cov-2) is still a severe threaft for human health currently, and the researches about it is a focus topic worldwide.
Aim of the study: In this study, we will collect some laboratory results of the patients with coronavirus disease (COVID-19) to assess the function of liver, heart, kidney and even pancreas.
Subjects and Methods: Laboratory results of the patients with COVID-19 are collected. The biochemical indices are classified and used to assess the according function of liver, heart, kidney; meantime, and blood glucose is also observed and taken as an index to roughly evaluate pancreas.
Results: There were some in
... Show MoreThe meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when
... Show MoreBreast cancer is one of the most common malignant diseases among women;
Mammography is at present one of the available method for early detection of
abnormalities which is related to breast cancer. There are different lesions that are
breast cancer characteristic such as masses and calcifications which can be detected
trough this technique. This paper proposes a computer aided diagnostic system for
the extraction of features like masses and calcifications lesions in mammograms for
early detection of breast cancer. The proposed technique is based on a two-step
procedure: (a) unsupervised segmentation method includes two stages performed
using the minimum distance (MD) criterion, (b) feature extraction based on Gray
Anemia is one of the common types of blood diseases, it lead to lack of number of RBCs (Red Blood Cell) and amount hemoglobin level in the blood is lower than normal.
In this paper a new algorithm is presented to recognize Anemia in digital images based on moment variant. The algorithm is accomplished using the following phases: preprocessing, segmentation, feature extraction and classification (using Decision Tree), the extracted features that are used for classification are Moment Invariant and Geometric Feature.
The Best obtained classification rates was 84% is obtained when using Moment Invariants features and 74 % is obtained when using Geometric Feature. Results indicate that the proposed algorithm is very effective in detect
Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common abnormalities that may indicate breast cancer are masses and calcifications. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram images. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. The incidence of breast cancer in women has increased significantly in recent years.
This paper proposes a computer aided diagnostic system for the extracti
In this paper, the blow-up solutions for a parabolic problem, defined in a bounded domain, are studied. Namely, we consider the upper blow-up rate estimate for heat equation with a nonlinear Neumann boundary condition defined on a ball in Rn.