2020 International Seminar on Application for Technology of Information and Communication (iSemantic),
Journal Year:
2023,
Volume and Issue:
unknown, P. 490 - 495
Published: Sept. 16, 2023
Data
Encryption
Standard
(DES)
is
a
symmetric
encryption
algorithm
that
uses
single
key
to
encrypt
and
decrypt
information.
In
addition,
the
cipher
text
will
be
hidden
inside
an
image
using
Stepic.
DES
use
decryption
decrypt.
It
secure
maintain
speed
of
decryption.
The
result
this
study
lowest
error
we
got
as
Mean
Square
Error
(MSE)
0.00%
inversely
proportional
with
Peak
Signal
Noise
Ratio
(PSNR)
Avalanche
79.36%
34.91%
in
order
not
stable
for
Effect
(AVA).
Inversely
length
image,
longest
hidden,
more
changes
get
highest
Unified
Average
Changing
Intensity
(UACI)
Number
Pixels
Change
Rate
(NPCR)
biggest
size
43.47%
UACI
99.87%
NPCR.
Electronics,
Journal Year:
2023,
Volume and Issue:
12(3), P. 714 - 714
Published: Feb. 1, 2023
With
the
growing
number
of
cloud
users,
shared
data
auditing
is
becoming
increasingly
important.
However,
these
schemes
have
issues
with
certificate
management.
Although
there
a
certificate-shared
scheme,
it
ineffective
in
dealing
dynamic
and
protecting
privacy.
The
verifier
cannot
access
content
to
ensure
integrity
due
security
concerns.
This
paper
proposes
novel
technique
improve
control.
A
enhanced
storage
retrieval
mechanism
used
performance
cloud’s
mechanisms
achieve
this.
evaluated
concern
upload,
download,
encryption,
decryption
time.
As
file
size
grows,
so
does
time
takes
upload
it.
Similarly,
taken
encrypt
files
various
formats
sizes
evidenced
that
depends
on
format.
Thus,
encryption
increases
as
increases,
demonstrating
proposed
system.
Sustainability,
Journal Year:
2022,
Volume and Issue:
14(18), P. 11667 - 11667
Published: Sept. 16, 2022
The
amount
of
data
captured
is
expanding
day
by
which
leads
to
the
need
for
a
monitoring
system
that
helps
in
decision
making.
Current
technologies
such
as
cloud,
machine
learning
(ML)
and
Internet
Things
(IoT)
provide
better
solution
automation
systems
efficiently.
In
this
paper,
prediction
model
monitors
real-time
sensor
nodes
clinical
environment
using
algorithm
proposed.
An
IoT-based
smart
hospital
has
been
developed
controls
appliances
over
different
sensors
current
sensors,
temperature
humidity
sensor,
air
quality
ultrasonic
flame
sensor.
IoT-generated
have
three
important
characteristics,
namely,
real-time,
structured
enormous
amount.
main
purpose
research
predict
early
faults
an
IoT
order
ensure
integrity,
accuracy,
reliability
fidelity
IoT-enabled
devices.
proposed
fault
was
evaluated
via
tree,
K-nearest
neighbor,
Gaussian
naive
Bayes
random
forest
techniques,
but
showed
best
accuracy
others
on
provided
dataset.
results
proved
ML
techniques
applied
are
well
efficient
monitor
process,
considered
with
highest
94.25%.
could
be
helpful
user
make
regarding
recommended
control
unanticipated
losses
generated
due
during
process.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 52325 - 52351
Published: Jan. 1, 2024
Cloud
computing
is
a
fast-growing
industry
that
offers
various
online
services,
including
software,
resources,
and
databases.Its
payment
model
usage-based,
whereas
consistency
based
on
resource-sharing.Cloud
storage
popular
among
individuals
businesses
because
it
reduces
cost,
increases
productivity,
boosts
performance,
improves
security.However,
cloud
comes
with
security
risks
as
data
are
stored
third-party
providers,
Internet
access
limits
visibility
control.Effective
protection
key
issues
compared
traditional
on-premise
computing.There
several
methods
for
ensuring
in
the
cloud,
of
which
cryptography
most
important.Cryptography
range
features
authentication,
confidentiality,
integrity,
availability.However,
thorough
examination
different
single
study
lacking.This
comprehensively
examined
methods,
deoxyribose
nucleic
acid
(DNA),
elliptic
curve,
homomorphic,
hybrid,
lightweight,
novel
methods.The
analysis
addresses
their
methodology,
algorithms,
results,
applications,
limitations
provides
valuable
suggestions
cloud.This
paper
proposes
use
curve
(ECC)
to
ensure
safe
communication
lightweight
Things
(IoT)
devices
limited
resources.This
emphasizes
benefit
combining
asymmetric
symmetric
efficiency
hybrid
cryptography.
Electronics,
Journal Year:
2022,
Volume and Issue:
11(21), P. 3510 - 3510
Published: Oct. 28, 2022
Cloud
computational
service
is
one
of
the
renowned
services
utilized
by
employees,
employers,
and
organizations
collaboratively.
It
accountable
for
data
management
processing
through
virtual
machines
independent
end
users’
system
configurations.
The
usage
cloud
systems
very
simple
easy
to
organize.
They
can
easily
be
integrated
into
various
storages
incorporated
almost
all
available
software
tools
such
as
Hadoop,
Informatica,
DataStage,
OBIEE
purpose
Extraction-Transform-Load
(ETL),
processing,
reporting,
other
related
computations.
Because
this
low-cost-based
model,
users
utilize
services,
implementation
environment,
storage,
on-demand
resources
with
a
pay-per-use
model.
contributors
across
world
move
these
cloud-based
apps,
software,
large
volumes
in
form
files
databases
enormous
centers.
However,
main
challenge
that
cannot
have
direct
control
over
stored
at
do
not
even
know
integrity,
confidentiality,
level
security,
privacy
their
sensitive
data.
This
exceptional
property
creates
several
different
security
disputes
challenges.
To
address
challenges,
we
propose
novel
Quantum
Hash-centric
Cipher
Policy-Attribute-based
Encipherment
(QH-CPABE)
framework
improve
user’s
In
our
proposed
used
both
structured
unstructured
big
clinical
input
so
simulated
experimental
results
conclude
proposal
has
precise,
resulting
approximately
92%
correctness
bit
hash
change
96%
chaotic
dynamic
key
production,
enciphered
deciphered
time
compared
conventional
standards
from
literature.
Frontiers in Pharmacology,
Journal Year:
2022,
Volume and Issue:
13
Published: Nov. 9, 2022
Background:
Recently,
internet
hospitals
have
been
emerging
in
China,
saving
patients
time
and
money
during
the
COVID-19
pandemic.
In
addition,
pharmacy
services
that
link
doctors
are
becoming
essential
improving
patient
satisfaction.
However,
existing
hospital
service
mode
relies
primarily
on
manual
operations,
making
it
cumbersome,
inefficient,
high-risk.
Objective:
To
establish
an
based
artificial
intelligence
(AI)
provide
new
insights
into
Methods:
An
AI-based
was
established.
Initially,
prescription
rules
were
formulated
embedded
system
to
review
prescriptions
using
AI.
Then,
“medicine
pick-up
code,”
which
is
a
Quick
Response
(QR)
code
represents
specific
offline
self-pick-up
order,
created.
Patients
or
volunteers
could
pick
up
medications
at
drugstore
by
scanning
QR
through
window
wait
for
dispensing
machine
pharmacist
dispense
drugs.
Moreover,
medication
consultation
function
also
operational.
Results:
The
established
had
four
major
functional
segments:
online
drug
catalog
search,
preview
AI,
distribution,
response.
qualified
rate
of
AI
83.65%.
Among
16.35%
inappropriate
prescriptions,
49%
accepted
modified
physicians
proactively
51.00%
passed
after
pharmacists
intervened.
“offline
self-pick-up”
preferred
86%
collecting
their
hospital,
made
be
fully
applied.
A
total
426
consultants
served,
48.83%
them
consulted
outside
working
hours.
most
frequently
asked
questions
consultations
about
process,
followed
disease
diagnosis,
education.
Therefore,
proposed
respond
immediately
when
unavailable.
Conclusion:
references
departments
significance
this
study
lies
ensuring
safe/rational
use
medicines
raising
pharmacists’
efficiency.
Measurement Sensors,
Journal Year:
2022,
Volume and Issue:
24, P. 100521 - 100521
Published: Oct. 22, 2022
End
users
are
now
encircled
by
an
ever-increasing
volume
of
information
from
edge
devices
relevant
to
a
range
stakeholders,
thanks
the
introduction
computing
in
variety
application
domains.
However,
because
their
distrust,
these
unable
communicate
significant
amounts
data.
The
non-repudiation
and
non-tampering
features
block
chain
used
this
study
provide
trust
collaborative
edges.
To
address
limited
processing
capabilities
devices,
create
chain-based
huge
data
sharing
architecture
cooperative
Then,
for
high
computational
reduction,
propose
Proof-of-Collaboration
consensus
technique,
which
participate
formation
giving
PoC
credits.
Furthermore,
useless
transaction
filter
technique
was
proposed
offloading,
drastically
decreasing
chain's
storage
space
Comprehensive
tests
carried
out
illustrate
our
proposal's
better
performance.
Using
learning
opportunity
environment
friendly
sustainable
infrastructure
be
created
developing
countries.
Measurement Sensors,
Journal Year:
2022,
Volume and Issue:
24, P. 100520 - 100520
Published: Oct. 19, 2022
Now
a
day
to
achieve
security
of
digital
data,
utilizing
image
watermarking
scheme
is
the
option.
The
primary
purpose
upgrade
fulfill
need
sufficient
imperceptibility,
capacity,
and
robustness
watermark
against
several
attacks
like
JPEG
compression
parameter,
salt
pepper
noise,
cropping
factor
part
which
contains
rotating
at
one
particular
angle.
During
embedding
stage
in
scheme,
secret
message
or
introduced
into
host
without
destroying
quality
original
cover
for
authentication
data.
extraction
applying
process
that
employed
insertion
step
but
reverse
way.
In
this
paper
different
evaluation
based
on
methods
described.
Many
projects
have
been
presented
such
as
DCT,
DWT,
DFT,
SVD
using
FWHT,
QIM,
BPNN,
DFIS,
EZW,
Huffman
coding
provide
protection,
high
capacity.
world,
where
Peak
signal-to-noise
ratio
(PSNR)
utilized
determine
Normalized
correlation
(NC)
watermark.
Using
learning
opportunity
an
environment
friendly
can
be
used
with
sustainable
infrastructure
developing
countries.
Measurement Sensors,
Journal Year:
2023,
Volume and Issue:
26, P. 100670 - 100670
Published: Jan. 10, 2023
Recent
advancements
in
the
Internet
of
Things
(IoT)
have
enhanced
quality
life
globally.
Billions
devices
are
brought
under
ambit
IoT
to
make
them
smarter.
IoT-based
applications
generating
voluminous
data
and
managing
this
widespread
amount
real-time
through
Cloud
Technology,
which
offers
high
computational
storage
facilities.
However,
sending
all
cloud
can
bring
serious
concerns
for
applications,
critical
require
instant
action
without
any
delay.
Edge
computing
has
recently
emerged
as
an
effective
technology
handle
processing
tasks
locally.
Additionally,
important
concern
networks
is
response
emergency
on
time
increase
performance
large-scale
systems.
As
such,
scheduling
becomes
vital,
where
non-emergency
be
prioritized
offload
nearby
edge
servers
respectively
enhance
Quality
Service
(QoS).
The
execution
order
allocating
resources
computation
avoid
delays
two
most
factors
that
must
addressed
during
task
Computing.
With
aforementioned
issues,
we
design
a
Priority
aware
Task
Scheduling
(PaTS)
algorithm
sensor
schedule
priority
servers.
problem
formulated
multi-objective
function
efficiency
proposed
evaluated
using
Bio-inspired
NSGA-2
technique.
overall
improvement
average
queue
delay,
time,
energy
obtained
200
17.2%,
7.08%
11.4%,
respectively.
results
show
significant
when
compared
with
benchmark
algorithms
demonstrating
effectiveness
solution.
Similarly,
comparative
increased
from
1000
also
shows
subsequent
improvements.
In
recent
years,
technology
has
required
workplace
learning,
continuous
professional
development,
and
general
training
of
employees.
However,
little
research
been
done
in
this
area
to
evaluate
the
methods
effectiveness
these
teaching
styles
is
welcomed
by
learners.
Learning
collection
designers
often
use
identical
policy
collections,
targeting
students
or
testifying
success
younger
learning
students.
The
word
used
describe
education
a
very
mature
learner
(mostly
workplace)
androgyny
(according
knowledge
knowledge)
should
have
variety
experiences,
while
only
limited
amount
so
be
basic.
concept
opportunities
for
borrowed
from
classroom
discourses
expands
its
understanding
"socially
identifiable
event",
including
cultural
environmental
aspects
such
as
content,
time
participant.
study,
teachers
are
examine
sequence
available
them
they
rebuild
their
roles
learners
through
relationships
with
immediate
social
physical
contexts.
Development,
environment
conditions
many
ideas
aimed
at
clarifying
factors
following
discussion
introduces.
model
presented
fostering
need
focus
change.
Outlined
paper
proposed
on
various
put
forward
accredited
academics
incorporates
elements
relevant
most
workplaces.
Sensors,
Journal Year:
2022,
Volume and Issue:
22(21), P. 8232 - 8232
Published: Oct. 27, 2022
The
objective
of
the
present
work
is
for
assessing
ergonomics-based
IoT
(Internet
Things)
related
healthcare
issues
with
use
a
popular
multi-criteria
decision-making
technique
named
analytic
hierarchy
process
(AHP).
Multiple
criteria
decision
making
(MCDM)
that
combines
alternative
performance
across
numerous
contradicting,
qualitative,
and/or
quantitative
criteria,
resulting
in
solution
requiring
consensus.
AHP
flexible
strategy
organizing
and
simplifying
complex
MCDM
concerns
by
disassembling
compound
problem
into
an
ordered
array
relational
components
(evaluation
sub-criteria,
substitutions).
A
total
twelve
IoT-related
have
been
recognized
as
Lumbago
(lower
backache),
Cervicalgia
(neck
ache),
shoulder
pain;
digital
eye
strain,
hearing
impairment,
carpal
tunnel
syndrome;
distress,
exhaustion,
depression;
obesity,
high
blood
pressure,
hyperglycemia.
"Distress"
has
proven
itself
most
critical
issue,
followed
depression,
exhaustion.
These
four
categories
(excruciating
issues,
eye-ear-nerve
psychosocial
persistent
issues)
compared
ranked.
Based
on
calculated
mathematical
values,
"psychosocial
issues"
ranked
first
position
"persistent
"eye-ear-nerve
issues".
In
several
industrial
systems,
results
may
be
vital
importance
increasing
efficiency
human
force,
particularly
human-computer
interface
prolonged
hours.