Evaluating the Effectiveness and Challenges of the Solid Waste Management System in Lilongwe City Council, Malawi
Posture and Stress Detection System using Open CV and Media Pipe
City Council Help Desk Support System
DDoS Attacks Detection using Different Decision Tree Algorithms
Comprehensive Study on Blockchain Dynamic Learning Methods
Efficient Agent Based Priority Scheduling and LoadBalancing Using Fuzzy Logic in Grid Computing
A Survey of Various Task Scheduling Algorithms In Cloud Computing
Integrated Atlas Based Localisation Features in Lungs Images
A Computational Intelligence Technique for Effective Medical Diagnosis Using Decision Tree Algorithm
A Viable Solution to Prevent SQL Injection Attack Using SQL Injection
Medical image sequences are produced in enormous amount which requires a large storage capacity. These image sequences are of great importance, hence it is necessary to develop a system that produces high degree of compression while preserving the medical information. Lossless compression Technique is required to reduce the number of bits to store these image sequences and take less time to transmit over the network. This paper proposes a method that combines SPIHT with HCC to enhance the compression ratio. Inter-frame coding is used to exploit the correlation among image sequences. Initially SPIHT is applied with fast block matching process, Diamond Search. To enhance the efficiency of compression ratio a new scheme Head Code Compression is introduced. Results are compared in terms of Compression Ratio and Peak Signal-to-Noise Ratio with other state of art coding. Experimental results of our proposed methodology achieves 25% more reduction than the other state-of-the-art algorithms.
The patient's information plays a very vital role for tele-diagnosis and tele-surgery in Medical Industry. Medical image content authentication is very important, since medical image contents are more and more widely distributed. Reversible watermarking becomes a promising technique to embed the information into medical images. This paper defines the Region of Interest (ROI) in an image and tries to embed data in Region of Non Interest (RONI). When medical image is shared through network, for the compression purpose, we propose the JPEG-LS algorithm and to provide security, to maintain secrecy, reliability and accessibility of embedded data we have proposed two Novel algorithms ACC(Advanced Classical Cipher) and SHA-I (Secure hash Algorithm) to produce the Digital Signature and used Arnold's cat map method (Arnold's Transform). Patient information, disease information and DS is embedded into DICOM images. Increase in authentication can be achieved when medical experts access secured medical images from web servers using Kerberos technique.
Speech is one of the most promising model through which various human emotions such as happiness, anger, sadness, normal state can be determined, apart from facial expressions. Researchers have proved that acoustic parameters of a speech signal such as energy, pitch, Mel Frequency Cepstral Coefficient (MFCC) are vital in determining the emotional state of a person. There is an increasing need for a new feature selection method, to increase the processing rate and recognition accuracy of the classifier, by selecting the discriminative features. This study investigates the various feature selection algorithms, used for selecting the optimal features from speech vectors which are extracted using MFCC. The feature selected is then used in the modeling stage.
Cloud computing refers to a network that distributes processing power, applications, and large systems among many computers. Cloud computing seems to offer some incredible benefits for communicators: the availability of an incredible array of software applications, access to lightning-quick processing power, unlimited storage, and the ability to easily share and process information. All of this is available through the browser any time it can access the Internet. While this might all appear enticing, there remain issues of reliability, portability, privacy, and security, since the data transmission on the internet or over any networks are vulnerable to the hackers attack. The authors are in great need of encrypting the data. This paper combines the techniques of cloud data storage and content Distribution by dynamic broadcast encryption algorithm along with the Bit Torrent application which results in minimizing the difficulties of bulky data and aims in resulting efficient sharing of the secure storage services in cloud computing.
With the explosion of networks and huge amount of data transmitted along, securing data content is becoming more and more important. The protection afforded to an automated information system is to attain the applicable objectives of preserving the integrity, accountability, authenticity and non repudiation. Many cryptographic Symmetric and Asymmetric algorithms are proposed. But symmetric key have some weakness such as suffering Brute Force, desynchronization etc.To get rid of from the weakness and reduce the system workload, we adopt Rivest Shamir Adleman (RSA) to construct an asymmetric key [2].Among the asymmetric algorithms the most widely accepted and implemented approach is the RSA encryption. Pseudo Random Numbers (PRN) are used in a number of areas such as Cryptography, Scientific Statistical Simulation etc. In cryptography the pseudo random number is a crucial element in the secret keys for cryptography algorithms and protocols. In this paper we have introduced new concept of RSA algorithm which is based on PN (Prime Numbers). These PN are selected from PRN sequence. The PN are used as input to RSA (Rivest Shamir Adleman) algorithm [3]. This technique is implemented by MATLAB