An Evaluation of Number of Pixels Change Rate (NPCR) in Symetric Cryptography Based on Data Encryption Standard (DES) DOI

Muhammad Rizky Naufal,

Christy Atika Sari, Eko Hari Rachmawanto

et al.

2020 International Seminar on Application for Technology of Information and Communication (iSemantic), Journal Year: 2023, Volume and Issue: unknown, P. 490 - 495

Published: Sept. 16, 2023

Data Encryption Standard (DES) is a symmetric encryption algorithm that uses single key to encrypt and decrypt information. In addition, the cipher text will be hidden inside an image using Stepic. DES use decryption decrypt. It secure maintain speed of decryption. The result this study lowest error we got as Mean Square Error (MSE) 0.00% inversely proportional with Peak Signal Noise Ratio (PSNR) Avalanche 79.36% 34.91% in order not stable for Effect (AVA). Inversely length image, longest hidden, more changes get highest Unified Average Changing Intensity (UACI) Number Pixels Change Rate (NPCR) biggest size 43.47% UACI 99.87% NPCR.

Language: Английский

Exploring the recent trends in Big Data Analysis DOI Open Access

S Suresh,

M Ramachandran,

Chinnasami Sivaji

et al.

Published: July 1, 2022

Big Data is a collection of technologies developed to store, analyze and manage this data. It macro tool. Today it used in fields as diverse medicine, agriculture, gambling environmental protection. Machine learning, forecasting Companies use big data streamline their marketing campaigns techniques. Modeling other advanced analytics applications enable organizations generate valuable insights. machine learning. Programs cannot balance large any particular database. When datasets are size, velocity, volume, the following three distinct dimensions constitute "big data." Examples include stock markets, social media platforms, jet engines. But growing exponentially with time. Traditional management tools store or process efficiently. scale technology by Story, Analysis Manoj, Macro-Tool. Find patterns exploding confusion information about smart design, however, implying that various structures structured, whether includes amount information, speed which generated collected, variety scope related points. In past, was collected only from spreadsheets databases large, disparate grew at an ever-increasing rate. Very complex refers amounts for sets impossible traditional processing applications. Is software configuration handle problem? Apache application storing analyzing Analytical techniques against very heterogeneous containing varying data, help businesses gain insights today's massive sources. Defined extraction. People, companies more machines now developing be handled tools. designed discover chaos explode order design solutions.

Language: Английский

Citations

9

The Role of Ultraviolet Radiation in Human Race DOI Open Access
Sowmiya Soundharaj, M Ramachandran,

Chinnasami Sivaji

et al.

Environmental science and engineering, Journal Year: 2022, Volume and Issue: 1(2), P. 48 - 56

Published: Aug. 1, 2022

Language: Английский

Citations

7

Sustainable energy efficient workflow classification and scheduling in geo distributed cloud datacenter DOI Creative Commons

Anu Priya Sharma,

Jaspreet Singh, Yonis Gulzar

et al.

Discover Sustainability, Journal Year: 2024, Volume and Issue: 5(1)

Published: June 25, 2024

Abstract Data centers are a major source of carbon emissions and subsequently contributing to global footprints. Keeping in view providing sustainable solution society, we have analyzed various factors that can help achieve neutrality maximum sustainability. Our study pointed towards the need follow approach for incoming workflow throughout life-cycle centers. We workloads be segregated before assigning them data so energy-efficient resource allocation could done. This paper demonstrates unsupervised learning techniques cluster cloud workloads. The heterogeneous were characterized using machine approaches appropriate clusters crafted. For analysis, Google Cluster Dataset is used. In order improve accuracy, normalized, random samples selected clustering. algorithms applied able successfully determine further used scheduling.

Language: Английский

Citations

1

A Novel and Accurate Method of Diagnosis via AI and ML for Smart HC System DOI

J Ruby Elizabeth,

Mathews Emmanuel,

E Aswini

et al.

Published: May 14, 2024

Language: Английский

Citations

1

An Empirical Analysis and Overview of a Green 6-G Paradigms and its Various Implementation Applications DOI

Dtv Dharmajee Rao,

Kuldeep Sharma, Sanjeev Kumar Joshi

et al.

Published: May 14, 2024

Language: Английский

Citations

1

Approaches and Methodologies for Distributed Systems: Threats, Challenges, and Future Directions DOI

Bhawna,

Veena Parihar

Published: March 8, 2024

The widespread use of distributed systems has led to a growing concern over their security. With the increasing number devices connected Internet, risk security breaches in these become major issue. In this chapter, we will explore various threats that face, including hacking, malware, and denial service attacks. We also examine current state standards protocols for systems, those proposed by industry groups government organizations. addition, discuss challenges wireless communication integration into existing networks. chapter cover access control methods, such as role-based (RBAC), discretionary (DAC), mandatory (MAC), can be applied systems. Finally, summarize key issues securing future directions research development.

Language: Английский

Citations

1

An efficient task allocation framework for scheduled data in edge based Internet of Things using hybrid optimization algorithm approach DOI
Malvinder Singh Bali, Roobaea Alroobaea,

Sultan Algarni

et al.

Physical Communication, Journal Year: 2023, Volume and Issue: 58, P. 102047 - 102047

Published: March 13, 2023

Language: Английский

Citations

3

Exploring Various Digital Communication and its Classification DOI Open Access
Vimala Saravanan, M Ramachandran, Sowmiya Soundharaj

et al.

Published: July 1, 2022

Digital communication is the physical transfer of data through a point-to-point or multidisciplinary channel. This to exchange private messages. plays an important role in today's world electronics. The rate digital depends on its characteristics provides seamless experience customers and partners direct AI chat bots automation various forms such as makes easier for access companies simultaneously. It's convenient, it's easy, cheap, fast because it can be done over long distances Internet other things via hardware processing circuits. Physical transmission channels more flexible than analog with higher energy consumption. It required bandwidth compared systems.

Language: Английский

Citations

4

Ensuring privacy and confidentiality of cloud data: A comparative analysis of diverse cryptographic solutions based on run time trend DOI Creative Commons
John Kwao Dawson, Frimpong Twum,

James Benjamin Hayfron Acquah

et al.

PLoS ONE, Journal Year: 2023, Volume and Issue: 18(9), P. e0290831 - e0290831

Published: Sept. 7, 2023

The cloud is becoming a hub for sensitive data as technology develops, making it increasingly vulnerable, especially more people get access. Data should be protected and secured since larger number of individuals utilize the variety purposes. Confidentiality privacy attained through use cryptographic techniques. While each method completes same objective, they all employ different amounts CPU, memory, throughput, encryption, decryption times. It necessary to contrast various possibilities in order choose optimal algorithm. An integrated size 5n*102 (KB (∈ 1,2,4,10,20,40) evaluated this article. Performance metrics including run time, memory use, throughput time were used comparison. To determine effectiveness technique, sizes fifteen (15) times, mean simulation results then reported. In terms trend, NCS superior other algorithms according Friedman's test Bonferroni's Post Hoc test.

Language: Английский

Citations

2

RETRACTED: Service application model design for users using fuzzy semantic ontology model in cloud computing DOI

V. Arulkumar,

A. Sandana Karuppan,

Sini Anna Alex

et al.

Journal of Intelligent & Fuzzy Systems, Journal Year: 2023, Volume and Issue: 46(2), P. 3811 - 3826

Published: Dec. 22, 2023

This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433.

Language: Английский

Citations

2