An Evaluation of Number of Pixels Change Rate (NPCR) in Symetric Cryptography Based on Data Encryption Standard (DES) DOI

Muhammad Rizky Naufal,

Christy Atika Sari, Eko Hari Rachmawanto

et al.

2020 International Seminar on Application for Technology of Information and Communication (iSemantic), Journal Year: 2023, Volume and Issue: unknown, P. 490 - 495

Published: Sept. 16, 2023

Data Encryption Standard (DES) is a symmetric encryption algorithm that uses single key to encrypt and decrypt information. In addition, the cipher text will be hidden inside an image using Stepic. DES use decryption decrypt. It secure maintain speed of decryption. The result this study lowest error we got as Mean Square Error (MSE) 0.00% inversely proportional with Peak Signal Noise Ratio (PSNR) Avalanche 79.36% 34.91% in order not stable for Effect (AVA). Inversely length image, longest hidden, more changes get highest Unified Average Changing Intensity (UACI) Number Pixels Change Rate (NPCR) biggest size 43.47% UACI 99.87% NPCR.

Language: Английский

Enhanced Cloud Storage Encryption Standard for Security in Distributed Environments DOI Open Access

A. Reyana,

Sandeep Kautish,

Sapna Juneja

et al.

Electronics, Journal Year: 2023, Volume and Issue: 12(3), P. 714 - 714

Published: Feb. 1, 2023

With the growing number of cloud users, shared data auditing is becoming increasingly important. However, these schemes have issues with certificate management. Although there a certificate-shared scheme, it ineffective in dealing dynamic and protecting privacy. The verifier cannot access content to ensure integrity due security concerns. This paper proposes novel technique improve control. A enhanced storage retrieval mechanism used performance cloud’s mechanisms achieve this. evaluated concern upload, download, encryption, decryption time. As file size grows, so does time takes upload it. Similarly, taken encrypt files various formats sizes evidenced that depends on format. Thus, encryption increases as increases, demonstrating proposed system.

Language: Английский

Citations

30

Cloud-Based Fault Prediction for Real-Time Monitoring of Sensor Data in Hospital Environment Using Machine Learning DOI Open Access

Mudita Uppal,

Deepali Gupta,

Sapna Juneja

et al.

Sustainability, Journal Year: 2022, Volume and Issue: 14(18), P. 11667 - 11667

Published: Sept. 16, 2022

The amount of data captured is expanding day by which leads to the need for a monitoring system that helps in decision making. Current technologies such as cloud, machine learning (ML) and Internet Things (IoT) provide better solution automation systems efficiently. In this paper, prediction model monitors real-time sensor nodes clinical environment using algorithm proposed. An IoT-based smart hospital has been developed controls appliances over different sensors current sensors, temperature humidity sensor, air quality ultrasonic flame sensor. IoT-generated have three important characteristics, namely, real-time, structured enormous amount. main purpose research predict early faults an IoT order ensure integrity, accuracy, reliability fidelity IoT-enabled devices. proposed fault was evaluated via tree, K-nearest neighbor, Gaussian naive Bayes random forest techniques, but showed best accuracy others on provided dataset. results proved ML techniques applied are well efficient monitor process, considered with highest 94.25%. could be helpful user make regarding recommended control unanticipated losses generated due during process.

Language: Английский

Citations

33

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing DOI Creative Commons

K. Sasikumar,

Sivakumar Nagarajan

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 52325 - 52351

Published: Jan. 1, 2024

Cloud computing is a fast-growing industry that offers various online services, including software, resources, and databases.Its payment model usage-based, whereas consistency based on resource-sharing.Cloud storage popular among individuals businesses because it reduces cost, increases productivity, boosts performance, improves security.However, cloud comes with security risks as data are stored third-party providers, Internet access limits visibility control.Effective protection key issues compared traditional on-premise computing.There several methods for ensuring in the cloud, of which cryptography most important.Cryptography range features authentication, confidentiality, integrity, availability.However, thorough examination different single study lacking.This comprehensively examined methods, deoxyribose nucleic acid (DNA), elliptic curve, homomorphic, hybrid, lightweight, novel methods.The analysis addresses their methodology, algorithms, results, applications, limitations provides valuable suggestions cloud.This paper proposes use curve (ECC) to ensure safe communication lightweight Things (IoT) devices limited resources.This emphasizes benefit combining asymmetric symmetric efficiency hybrid cryptography.

Language: Английский

Citations

8

An Efficient Hybrid QHCP-ABE Model to Improve Cloud Data Integrity and Confidentiality DOI Open Access
Kranthi Kumar Singamaneni, Ali Nauman,

Sapna Juneja

et al.

Electronics, Journal Year: 2022, Volume and Issue: 11(21), P. 3510 - 3510

Published: Oct. 28, 2022

Cloud computational service is one of the renowned services utilized by employees, employers, and organizations collaboratively. It accountable for data management processing through virtual machines independent end users’ system configurations. The usage cloud systems very simple easy to organize. They can easily be integrated into various storages incorporated almost all available software tools such as Hadoop, Informatica, DataStage, OBIEE purpose Extraction-Transform-Load (ETL), processing, reporting, other related computations. Because this low-cost-based model, users utilize services, implementation environment, storage, on-demand resources with a pay-per-use model. contributors across world move these cloud-based apps, software, large volumes in form files databases enormous centers. However, main challenge that cannot have direct control over stored at do not even know integrity, confidentiality, level security, privacy their sensitive data. This exceptional property creates several different security disputes challenges. To address challenges, we propose novel Quantum Hash-centric Cipher Policy-Attribute-based Encipherment (QH-CPABE) framework improve user’s In our proposed used both structured unstructured big clinical input so simulated experimental results conclude proposal has precise, resulting approximately 92% correctness bit hash change 96% chaotic dynamic key production, enciphered deciphered time compared conventional standards from literature.

Language: Английский

Citations

27

Artificial intelligence-based internet hospital pharmacy services in China: Perspective based on a case study DOI Creative Commons
Fengjiao Bu, Hong Sun, Ling Li

et al.

Frontiers in Pharmacology, Journal Year: 2022, Volume and Issue: 13

Published: Nov. 9, 2022

Background: Recently, internet hospitals have been emerging in China, saving patients time and money during the COVID-19 pandemic. In addition, pharmacy services that link doctors are becoming essential improving patient satisfaction. However, existing hospital service mode relies primarily on manual operations, making it cumbersome, inefficient, high-risk. Objective: To establish an based artificial intelligence (AI) provide new insights into Methods: An AI-based was established. Initially, prescription rules were formulated embedded system to review prescriptions using AI. Then, “medicine pick-up code,” which is a Quick Response (QR) code represents specific offline self-pick-up order, created. Patients or volunteers could pick up medications at drugstore by scanning QR through window wait for dispensing machine pharmacist dispense drugs. Moreover, medication consultation function also operational. Results: The established had four major functional segments: online drug catalog search, preview AI, distribution, response. qualified rate of AI 83.65%. Among 16.35% inappropriate prescriptions, 49% accepted modified physicians proactively 51.00% passed after pharmacists intervened. “offline self-pick-up” preferred 86% collecting their hospital, made be fully applied. A total 426 consultants served, 48.83% them consulted outside working hours. most frequently asked questions consultations about process, followed disease diagnosis, education. Therefore, proposed respond immediately when unavailable. Conclusion: references departments significance this study lies ensuring safe/rational use medicines raising pharmacists’ efficiency.

Language: Английский

Citations

27

Blockchain technology: Applied to big data in collaborative edges DOI Creative Commons
Kamal Saluja, Sunil Gupta, Amit Vajpayee

et al.

Measurement Sensors, Journal Year: 2022, Volume and Issue: 24, P. 100521 - 100521

Published: Oct. 22, 2022

End users are now encircled by an ever-increasing volume of information from edge devices relevant to a range stakeholders, thanks the introduction computing in variety application domains. However, because their distrust, these unable communicate significant amounts data. The non-repudiation and non-tampering features block chain used this study provide trust collaborative edges. To address limited processing capabilities devices, create chain-based huge data sharing architecture cooperative Then, for high computational reduction, propose Proof-of-Collaboration consensus technique, which participate formation giving PoC credits. Furthermore, useless transaction filter technique was proposed offloading, drastically decreasing chain's storage space Comprehensive tests carried out illustrate our proposal's better performance. Using learning opportunity environment friendly sustainable infrastructure be created developing countries.

Language: Английский

Citations

25

Efficient methods for digital image watermarking and information embedding DOI Creative Commons
Sunil Gupta, Kamal Saluja, Vikas Solanki

et al.

Measurement Sensors, Journal Year: 2022, Volume and Issue: 24, P. 100520 - 100520

Published: Oct. 19, 2022

Now a day to achieve security of digital data, utilizing image watermarking scheme is the option. The primary purpose upgrade fulfill need sufficient imperceptibility, capacity, and robustness watermark against several attacks like JPEG compression parameter, salt pepper noise, cropping factor part which contains rotating at one particular angle. During embedding stage in scheme, secret message or introduced into host without destroying quality original cover for authentication data. extraction applying process that employed insertion step but reverse way. In this paper different evaluation based on methods described. Many projects have been presented such as DCT, DWT, DFT, SVD using FWHT, QIM, BPNN, DFIS, EZW, Huffman coding provide protection, high capacity. world, where Peak signal-to-noise ratio (PSNR) utilized determine Normalized correlation (NC) watermark. Using learning opportunity an environment friendly can be used with sustainable infrastructure developing countries.

Language: Английский

Citations

24

An effective technique to schedule priority aware tasks to offload data on edge and cloud servers DOI Creative Commons
Malvinder Singh Bali, Kamali Gupta, Deepali Gupta

et al.

Measurement Sensors, Journal Year: 2023, Volume and Issue: 26, P. 100670 - 100670

Published: Jan. 10, 2023

Recent advancements in the Internet of Things (IoT) have enhanced quality life globally. Billions devices are brought under ambit IoT to make them smarter. IoT-based applications generating voluminous data and managing this widespread amount real-time through Cloud Technology, which offers high computational storage facilities. However, sending all cloud can bring serious concerns for applications, critical require instant action without any delay. Edge computing has recently emerged as an effective technology handle processing tasks locally. Additionally, important concern networks is response emergency on time increase performance large-scale systems. As such, scheduling becomes vital, where non-emergency be prioritized offload nearby edge servers respectively enhance Quality Service (QoS). The execution order allocating resources computation avoid delays two most factors that must addressed during task Computing. With aforementioned issues, we design a Priority aware Task Scheduling (PaTS) algorithm sensor schedule priority servers. problem formulated multi-objective function efficiency proposed evaluated using Bio-inspired NSGA-2 technique. overall improvement average queue delay, time, energy obtained 200 17.2%, 7.08% 11.4%, respectively. results show significant when compared with benchmark algorithms demonstrating effectiveness solution. Similarly, comparative increased from 1000 also shows subsequent improvements.

Language: Английский

Citations

12

Exploring the Effects of Work Place Learning in the Robotised Millennium DOI Open Access

N Hemamalini,

M Ramachandran, Kurinjimalar Ramu

et al.

Published: July 1, 2022

In recent years, technology has required workplace learning, continuous professional development, and general training of employees. However, little research been done in this area to evaluate the methods effectiveness these teaching styles is welcomed by learners. Learning collection designers often use identical policy collections, targeting students or testifying success younger learning students. The word used describe education a very mature learner (mostly workplace) androgyny (according knowledge knowledge) should have variety experiences, while only limited amount so be basic. concept opportunities for borrowed from classroom discourses expands its understanding "socially identifiable event", including cultural environmental aspects such as content, time participant. study, teachers are examine sequence available them they rebuild their roles learners through relationships with immediate social physical contexts. Development, environment conditions many ideas aimed at clarifying factors following discussion introduces. model presented fostering need focus change. Outlined paper proposed on various put forward accredited academics incorporates elements relevant most workplaces.

Language: Английский

Citations

12

Analysis of IoT-Related Ergonomics-Based Healthcare Issues Using Analytic Hierarchy Process Methodology DOI Creative Commons
Hemant Upadhyay,

Sapna Juneja,

Ghulam Muhammad

et al.

Sensors, Journal Year: 2022, Volume and Issue: 22(21), P. 8232 - 8232

Published: Oct. 27, 2022

The objective of the present work is for assessing ergonomics-based IoT (Internet Things) related healthcare issues with use a popular multi-criteria decision-making technique named analytic hierarchy process (AHP). Multiple criteria decision making (MCDM) that combines alternative performance across numerous contradicting, qualitative, and/or quantitative criteria, resulting in solution requiring consensus. AHP flexible strategy organizing and simplifying complex MCDM concerns by disassembling compound problem into an ordered array relational components (evaluation sub-criteria, substitutions). A total twelve IoT-related have been recognized as Lumbago (lower backache), Cervicalgia (neck ache), shoulder pain; digital eye strain, hearing impairment, carpal tunnel syndrome; distress, exhaustion, depression; obesity, high blood pressure, hyperglycemia. "Distress" has proven itself most critical issue, followed depression, exhaustion. These four categories (excruciating issues, eye-ear-nerve psychosocial persistent issues) compared ranked. Based on calculated mathematical values, "psychosocial issues" ranked first position "persistent "eye-ear-nerve issues". In several industrial systems, results may be vital importance increasing efficiency human force, particularly human-computer interface prolonged hours.

Language: Английский

Citations

11