Digital raw images obtained from the data set of various organizations require authentication, copyright protection, and security with simple processing. New Euclidean space point’s algorithm is ...proposed to authenticate the images by embedding binary logos in the digital images in the spatial domain. Diffie–Hellman key exchange protocol is implemented along with the Euclidean space axioms to maintain security for the proposed work. The proposed watermarking methodology is tested on the standard set of raw grayscale and RGB color images. The watermarked images are sent in the email, WhatsApp, and Facebook and analyzed. Standard watermarking attacks are also applied to the watermarked images and analyzed. The finding shows that there are no image distortions in the communication medium of email and WhatsApp. But in the Facebook platform, raw images experience compression and observed exponential noise on the digital images. The authentication and copyright protection are tested from the processed Facebook images. It is found that the embedded logo could be recovered and seen with added noise distortions. So the proposed method offers authentication and security with compression attacks. Similarly, it is found that the proposed methodology is robust to JPEG compression, image tampering attacks like collage attack, image cropping, rotation, salt-and-pepper noise, sharpening filter, semi-robust to Gaussian filtering, and image resizing, and fragile to other geometrical attacks. The receiver operating characteristics (ROC) curve is drawn and found that the area under the curve is approximately equal to unity and restoration accuracy of 67 to 100% for various attacks.
Wireless Sensor Network is an isolated set of low cost hardware sensor nodes that supply nodes, memory and processing resources to limit battery life for environmental (or physical) monitoring ...conditions. WSN is used in unsafe and unforeseen circumstances and thus prone to multiple forms of attack. A replication or clone attack, in which the attacker can instantly grab a network node and get data from the node confiscated, represents a physical threat. Then reprogram to create a node replica. These copies will then be distributed through all networking areas and named true networkers as a replicated node cannot be found. Where centralized clone attack detection methods can be used, the WSN can be either static. In the proposed work, the effective technique for the detection and classification of clone node is presented. Initially, the input data is preprocessed and the preprocessed data is normalized for removing unwanted data. From this, the best features are selected for the classification process. So as to attain the optimal data the preprocessed data is optimized with the use of Modified Particle Swarm Optimization technique (MPSO). The data is then clustered by means of K-means clustering process. The training is done by means of this MPSO and the classifier Modified Artificial Neural Network (MANN). The optimized and trained features are then classified with the utilization of MANN technique to detect and classify the clone attack as normal or malicious. Additionally, the Clone node identification can be done using the Trust Aware Intense Grade Boosting Random Forest Clone Node Identification Algorithm. Finally, the performance analysis is performed and the proposed and the existing techniques are analyzed to demonstrate the efficiency of the scheme.
Severe psychological trauma triggers genetic, biochemical and morphological changes in amygdala neurons, which underpin the development of stress-induced behavioural abnormalities, such as high ...levels of anxiety. miRNAs are small, non-coding RNA fragments that orchestrate complex neuronal responses by simultaneous transcriptional/translational repression of multiple target genes. Here we show that miR-483-5p in the amygdala of male mice counterbalances the structural, functional and behavioural consequences of stress to promote a reduction in anxiety-like behaviour. Upon stress, miR-483-5p is upregulated in the synaptic compartment of amygdala neurons and directly represses three stress-associated genes: Pgap2, Gpx3 and Macf1. Upregulation of miR-483-5p leads to selective contraction of distal parts of the dendritic arbour and conversion of immature filopodia into mature, mushroom-like dendritic spines. Consistent with its role in reducing the stress response, upregulation of miR-483-5p in the basolateral amygdala produces a reduction in anxiety-like behaviour. Stress-induced neuromorphological and behavioural effects of miR-483-5p can be recapitulated by shRNA mediated suppression of Pgap2 and prevented by simultaneous overexpression of miR-483-5p-resistant Pgap2. Our results demonstrate that miR-483-5p is sufficient to confer a reduction in anxiety-like behaviour and point to miR-483-5p-mediated repression of Pgap2 as a critical cellular event offsetting the functional and behavioural consequences of psychological stress.
Abstract
Agriculture exhibitions an important role in the progression and enlargement of the economy of any country. Prediction of crop yield will be useful for farmers, but it is difficult to ...predict crop yield because of the climatic factors such as rainfall, soil factors and so on. To tackle these issues, we are implementing a novel algorithm called Lemuria by applying data mining in agriculture especially for crop yield analysis and prediction. This novel algorithm is the hybridization of classifiers for pre-training, training and testing: deep belief network for feature learning, k-means clustering together with particle swarm optimization (PSO) to get the global solution as well as naïve Bayes clustering with PSO for testing. The performance of the Lemuria algorithm is evaluated in Python, which provides an accuracy of 97.74% for crop prediction by considering the rainfall dataset and also stated that this gives the optimum results in comparison with the existing methodologies.
Gender identification or classification is a challenging task in computer vision as the biometrics of male and female such as fingerprints, face, vein have many variations. Among the various ...biometrics, fingerprints are commonly available in a crime scene. In this, study, gender identification system for crime scene analysis using fingerprints is presented. Initially, the fingerprints are de-noised by median filter and Otsu thresholding is employed to binarize the fingerprints in the preprocessing stage. Then, the features are extracted by Box-Cox transformation method. Finally, the classification is made by logistic regression classifier. A better classification accuracy of 96% is achieved by the gender identification system using Box-Cox transformation and logistic regression classifier.
Many of the characteristics associated with mammalian sleep are also observed in Drosophila melanogaster Meigen, making the fruit fly a powerful model organism for studying the genetics of this ...important process. Included among the similarities is the presence of sexual dimorphic sleep patterns, which, in flies, are manifested as increased mid‐day sleep (‘siesta’) in males compared with females. In the present study, targeted mis‐expression of the genes transformer (tra) and tra2 is used to either feminize or masculinize specific neural and non‐neural tissues in the fly. Feminization of male D. melanogaster using three different GAL4 drivers that are expressed in the mushroom bodies induces a female‐like reduced siesta, whereas the masculinization of females using these drivers triggers the male‐like increased siesta. A similar reversal of sex‐specific sleep is also observed by mis‐expressing tra in the fat body, which is a key tissue in energy metabolism and hormone secretion. In addition, the daily expression levels of takeout, an important circadian clock output gene, are sexually dimorphic. Taken together, these experiments suggest that sleep sexual dimorphism in D. melanogaster is driven by multiple neural and non‐neural circuits, within and outside the brain.
To demand high power back up by increasing the user's need for applications in a single IC, the power dissipation takes place. The proposed two approaches are control Logic (CL) with Integrated Clock ...Gating (ICG) and Programmable Combinational Logic(PCL)and Gate Logic(GL) with ICG to achieve the low power and low dynamic leakage in 16-bit Counter. These approaches operate in different Logic to Generate/stop the clock for low-power digital circuits. The First approach of control Logic with ICG stops the clock only for single Most Significant Flip Flop Transistor. This approach consumes 1.6 mW and 15% more power savings than Existing. But the second approach only consumes 0.0261 mW power, which is 98% more power savings than a first proposed approach of CL with ICG and conventional counters. These dramatic boom power savings by stopping the clock for all redundant transition in Most Significant Flip Flop Transistors using PCL & GL with ICG. Analyse the second approach without ICG for 16-bit counter will consume 0.0334 mW, which consumes 21.96% high power than the presence of ICG in counter circuits. Moreover, the same proposed technique of the second approach applies for ISCAS'89 S444 circuits, which saves >90% power improvement than the conventional method and ordinary 16-bit counter-power analysis by the same technology, which consumes 42.42% high power than proposed low-power counter. The Low Power 16-bit counter design implementation using 16 nm Cadence Genustechnology, which attains the dynamic leakage with ICG is 0.170nW and without ICG is 0.177nW with an operating voltage of 0.8 V.
In average 8T SRAM Architecture, it requires maximum number of transistor counts and does not need any write back scheme. To achieve the higher word line (WL) Voltage, the bit line (BL) is connected ...to the gate of the read buffer SRAM Architecture. That boosted voltage is not used when the threshold voltage is high. Its leads to the reduction of read stability of the SRAM Design. In that case, the gate terminal of the SRAM Architecture is not connected to the buffer results a large delay. To overcome the disadvantage of the average 8T SRAM architecture, the 6T SRAM Design is proposed. In proposed 6T SRAM Design, the number of transistor counts and Power is reduced than the existing design. Various factors of the proposed SRAM Architecture, which stores multiple bits in terms of power and transistor counts. The simulation of 6T SRAM design is carried out in S-Edit and the synthesized in T-Spice.
WSN is an infrastructure less network that consists of mobile nodes that communicate with each other over wireless links. WSN is vulnerable to the node replication attack (clone attack). Attackers ...through compromising one sensor node replicate many clones having the same identity (ID) from the compromised node, and place these clones in various places of network. Clones contain all the credentials of legitimate member so appears authentic. This makes the conventional cryptographic tools useless and clone detection difficult. Once the node replication attack has been successful it can help the attacker to exploit almost all of the network operations, like routing, data collection, and key distribution, and also to help launch various other attacks such as black hole, wormhole etc. This proposed work therefore attempts a SDN based mechanism that implements a network level route analysis and time-based analysis methods which involves a low cost timely monitoring of the environment to identify and avoid redundant nodes which may be caused due to cloning attack. Thus, the SDN based cyber security applications are most useful in this situation. The implementation of this SDN based mechanism in WSN helps in maintaining and improving the QoS (Quality of service) constraints. The hybrid clone node detection (HCND) mechanism helps to detect the clone node present in the wireless network. This is to perform efficient clone detection in such a way to eliminate cloning attack in proactive fashion. To detect clones locally as well as across geographical region through cost effective identity verification procedure. This method helps to protect the wireless sensor network from the node identity replicas using the superimposed SDIS junction code. The node identity replicas help to choose the credible path for successful transmissions. The superimposed method is to be used for retrieval of information from node participating on the network. To thwart cluster of attacks hosted from the clones, by removing the hosting clones. The simulation result shows that there is the performance analysis of various parameters such as false positive, false negative ratio analysis, precision analysis, recall analysis and detection analysis.
Targeting to handle the explosive growth of mobile media streaming, the emerging fifth‐generation systems need to manage control plane and data plane appropriately. The control plane is used for node ...association in the heterogeneous cellular network and data plane for media streaming with heterogeneous user equipment. To satisfy the aforementioned requirements, we proposed a solution to alter the control plane and data plane by systematic usage of in‐network resource available in wireless edge (eg, macro, pico, and femto) small base stations (SBSs) for the deployment of smart association policies and media processing technique that improve the efficiency in fifth‐generation wireless networks. On the other hand, due to the broadcast nature of wireless medium, we introduce the media processing agent (MPA) that would reside in SBSs to process the media on the fly and then deliver streams adaptively to the participants. MPA can identify the presenter among the participant to create the server channel with media server and the observer can service from MPA itself. To better exploit the participant's node association with the nearby SBSs, association policies are enhanced with concerns on dynamic association with SBSs. In addition, we describe a heuristic algorithm that provides significant performance gains compared with the existing centralized processing schemes. Numerical results are presented with realistic parameters for the media processing speed, and the quality of delivery demonstrate up to 20% reduction in central processing unit usage over existing (centralized) media processing schemes.
We introduce a media processing agent (MPA) to alter the control plane and data plane by systematic usage of in‐network resource available in wireless edge (eg, macro, pico, and femto) base stations (BSs) for the deployment of smart association policies and media processing technique that improve the efficiency in fifth‐generation wireless networks. The MBA reside in BSs to support mobility with dynamic association and adaptive delivery of media streams for heterogeneous user devices. MPA can identify the presenter and observer among the participant in conference and allow them to exchange media source with media server but prefetched media steam to serve for observer.