Visitor validation at entrance generates a large number of image files that need to be transmitted over to cloud for future reference. The image data needs to be protected by active and passive ...adversaries from performing cryptographic attacks on these data. The image data also needs to be authenticated before giving it for future use. Focusing on reliable and secure image sharing, the proposed method involves building a novel cloud platform, which aims to provide a secure storage in the public cloud. The main objective of this paper is to provide a new way of secure image data storage and transmission on cloud using cryptographic algorithms. To overcome the flaws in current system, a novel method using BigchainDB, which has advantages of blockchain technology and traditional database, is proposed for storing attributes of image.
A tree-ring δ18O chronology of Abies spectabilis from the Nepal Himalaya was established to study hydroclimate in the summer monsoon season over the past 223 years (ad 1778–2000). Response function ...analysis with ambient climatic records revealed that tree-ring δ18O was primarily controlled by the amount of precipitation and relative humidity during the monsoon season (June–September). Since tree-ring δ18O was simultaneously correlated with temperature, drought history in the monsoon season was reconstructed by calibrating against the Palmer Drought Severity Index (PDSI). Our reconstruction that accounts for 33.7% of the PDSI variance shows a decreasing trend of precipitation/moisture over the past two centuries, and reduction of monsoon activity can be found across different proxy records from the Himalaya and Tibet. Spatial correlation analysis with global sea surface temperatures suggests that the tropical oceans play a role in modulating hydroclimate in the Nepal Himalaya. Although the dynamic mechanisms of the weakening trend of monsoon intensity still remain to be analyzed, rising sea surface temperatures over the tropical Pacific and Indian Ocean could be responsible for the reduction of summer monsoon.
In the era of Internet of Things (IoT) infrastructure, Secured information transfer is necessitated between mobile and internet based services in IoT environments. As IoT environment connected to ...heterogeneous network, they become vulnerable to attacks and hence it is required for secured mechanism for data transfer. Moreover, when secured cryptographic algorithms are employed in mobile phones, battery consumption plays a major role. The IoT environment associated with proposed algorithm can be used to interlink humans and enable the use of a communication channel to bring forth inter machine interaction. The encryption procedures used here makes sure that the major concerns of authentication uniqueness, confidentiality and privacy of the users are maintained. This implies that the users and the service providers can implement the system security measures that have been proposed. Research is still being conducted to improve the architecture and implementation strategies in a real time environment. In order to solve those issues, this paper proposes a novel scalar point-multiplication which gives low energy consumed snippet based on elliptic curve cryptography (ECC) that provides same level of security and also keeps low energy consumption by speeding up the computation time. The performance evaluation with the key size of 14 and 16 bits reveals that the proposed algorithm can be fast and saves the battery life than the other conventional ECC algorithms.
With the increasing growth of AI, big data analytics, cloud computing, and Internet of Things applications, developing memristor devices and related hardware systems to compute the deep learning ...application needs extensive data calculations with low power consumption and lesser chip area. Deep learning model is one of the AI methods which is gaining importance in object detection, natural language processing, and pattern recognition. A large amount of data handling is essential for driving the deep learning model with less power consumption. To address these issues, the paper proposed the Memristor-based object detection on the CIFAR-10 dataset and achieved an accuracy of 85 percent. The memtorch package in python is employed to predict the objects for implementation.
In real time process, tracking of objects allows an agency to record, track, and examine an object and these features enhance the public service through better on-time performance and quicker ...response time for emergency. Radio-frequency identification (RFID) method is proposed to address the problem of security for automatically identifying and tracking tags attached to objects and to transfer data it is a wireless non-contact radio-frequency electromagnetic fields. Moreover, along with Performance Enhancement with Improved Security approach the new RFID method is established for enhancing the performance as well as guaranteeing security features and the components of a typical RFID method comprises RFID reader, RFID tag, backend system, and the cluster head. The tag is entrenched in the tracked object and it does not need to be within line of sight of the reader like a barcode. Moreover, SECF method is to apply secure RFID method and increase the efficiency in tracking of objects with improved security.
The quantity of fruit consumed by dispersers is highly variable among individuals within plant populations. The outcome of such selection operated by frugivores has been examined mostly with respect ...to changing spatial contexts. The influence of varying temporal contexts on frugivore choice, and their possible demographic and evolutionary consequences is poorly understood. We examined if temporal variation in fruit availability across a hierarchy of nested temporal levels (interannual, intraseasonal, 120 h, 24 h) altered frugivore choice for a complex seed dispersal system in dry tropical forests of southern India. The interactions between Phyllanthus emblica and its primary disperser (ruminants) was mediated by another frugivore (a primate), which made large quantities of fruit available on the ground to ruminants. The direction and strength of crop size and neighborhood effects on this interaction varied with changing temporal contexts. Fruit availability was higher in the first of the two study years, and at the start of the season in both years. Fruit persistence on trees, determined by primate foraging, was influenced by crop size and conspecific neighborhood densities only in the high fruit availability year. Fruit removal by ruminants was influenced by crop size in both years and neighborhood densities only in the high availability year. In both years, these effects were stronger at the start of the season. Intraseasonal reduction in fruit availability diminished inequalities in fruit removal by ruminants and the influence of crop size and fruiting neighborhoods. All trees were not equally attractive to frugivores in a P. emblica population at all points of time. Temporal asymmetry in frugivore-mediated selection could reduce potential for co-evolution between frugivores and plants by diluting selective pressures. Inter-dependencies formed between disparate animal consumers can add additional levels of complexity to plant-frugivore mutualistic networks and have potential reproductive consequences for specific individuals within populations.
With the rapid advancement in the mobile and computing technologies, individuals have an inclination to depend more on them in varied range of situations. For ensuring the secured communication among ...the devices, privacy and security are the most prominent concerns. Accordingly, sophisticated preventive measures that support both secure storage and secret transfer has begun as the need of the hour. Several conventional techniques focuses on the data encryption and key generation approaches to attain reliability. However, there were some short-comings in key aspects such as privacy, key management, and flexibility. So as to overcome existing issues the paper implements a compact, constant-time, and fast improvised ChaCha 20 stream cipher mechanism for encryption and decryption. Likewise, the generation of key is employed with the use of Diffie-Hellman key exchange protocol scheme based on the string comparison. Thus, a secured transmission occurs with a reduced rate of execution time, decryption time, and key generation time. The performance evaluation is made in terms of encryption time, decryption time and the key generation time and are compared with the existing techniques to prove the superiority of this proposed scheme.
Abstract
Melanoma is a dangerous skin cancer that may spread if not detected early. Thus, the medical industry has evolved with automated diagnostic tools that may assist physicians and even regular ...people diagnose an illness. Here, we provide a combined method for identifying melanomas on the skin. For our proposed approach, we make use of three forecasts. This problem was solved by training a neural network and two-learning machine classifiers on data describing the borders, textures, and colours of skin lesions. These tactics are combined for maximum effectiveness by majority voting. Tests show that using all three methods simultaneously improves precision.
Abstract
Nanotechnology seems to be an important scientific method for the diagnosis of a disorder that offers more precise and appropriate health information. Diabetes mellitus (DM) is a chronic ...condition frequently seen that severely affects human health. Gestational diabetes happens during gestation or gestational time. Gestational diabetes may arise from normal physical changes in the body experiences of a pregnant woman.. The placenta develops substances during pregnancy that conflict with just the enzyme insulin’s behavior. The Principle objective of this paper is to predict gestational diabetes using the rule-based system by creating a user profile with AbA1c. This research can be applied to a broader range of healthcare diagnostics to get better accuracy in the prediction