Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
  • India
Homomorphic encryption (HE) is an encryption technique where operations are performed on ciphertext. This encryption method can be used in varieties of applications by using public key algorithms. For transferring data from one place to... more
Homomorphic encryption (HE) is an encryption technique where operations are performed on ciphertext. This encryption method can be used in varieties of applications by using public key algorithms. For transferring data from one place to another, there are various encryption algorithms for storage of data and securing the operations, but they do not preserve privacy. HE is useful in various applications in which HE performs the different operations on encrypted data and provides results after calculations performed directly on the plaintext. Nowadays, security of information and calculations to deal with the data of big business has expanded massively. In any case, a basic issue emerges when there is a necessity of registering on such encrypted information where protection is built up. This paper represents homomorphic cryptosystems for preserving security, properties, and categories of homomorphic encryption. In addition to this, privacy-preserving applications of homomorphic cryptosystems in the field of cloud computing, private information retrieval, and data aggregation in wireless sensor network are also presented.
In this age of growing and developing information and technology, data security, integrity and confidentiality are essential aspects related to shared data over some network or medium. Many techniques over the years have been developed... more
In this age of growing and developing information and technology, data security, integrity and confidentiality are essential aspects related to shared data over some network or medium. Many techniques over the years have been developed for securing the messages from attack or theft or breach of very sensible and essential data when shared over a network. The security threats to data have been ascending, so are the data hiding or securing techniques. This is where Information Security has a role to play. Development of techniques and methods that prevents the essential and secret data being stolen and thus providing security to the data. This paper discusses the significance of Information Security, its evolution since its infant stage and study about various subdomains of the same. This paper also shows a comparative study of various Information Security Techniques, their pros and cons and the applications in various domains. This paper analyses various Information Security methods ...
Breast cancer is a deadly disease that affects the lives of millions of women throughout the world. Over time, the number of cases of breast cancer has increased. Preventing this disease is difficult and remains unidentified, but the... more
Breast cancer is a deadly disease that affects the lives of millions of women throughout the world. Over time, the number of cases of breast cancer has increased. Preventing this disease is difficult and remains unidentified, but the survival percentage can be improved if diagnosed early. The progress of computer-assisted diagnosis (CAD) of breast cancer has seen a lot of improvements thanks to advances in deep learning. With the notable advancement of deep neural networks, diagnostic capabilities are nearing a human expert's. In this paper, we used EfficientNet to classify mammograms. This model is introduced with the new concept of model scaling called compound scaling. Compound scaling is the strategy which scales the model by adding more layers to extend the receptive field along with more channels to catch the detailed features of larger input. We also compare the performance of various variants of EfficientNet over CBIS-DDSM mammogram datasets. We used the optimum fine-tun...
Research in the medical imaging field using deep learning approaches has become progressively contingent. Scientific findings reveal that supervised deep learning methods’ performance heavily depends on training set size, which expert... more
Research in the medical imaging field using deep learning approaches has become progressively contingent. Scientific findings reveal that supervised deep learning methods’ performance heavily depends on training set size, which expert radiologists must manually annotate. The latter is quite a tiring and time-consuming task. Therefore, most of the freely accessible biomedical image datasets are small-sized. Furthermore, it is challenging to have big-sized medical image datasets due to privacy and legal issues. Consequently, not a small number of supervised deep learning models are prone to overfitting and cannot produce generalized output. One of the most popular methods to mitigate the issue above goes under the name of data augmentation. This technique helps increase training set size by utilizing various transformations and has been publicized to improve the model performance when tested on new data. This article surveyed different data augmentation techniques employed on mammogra...
Mammograms are essential radiological images used to diagnose breast cancer well in advance. However, an accurate diagnosis also depends on the quality of mammogram images. Therefore, removal of artefacts and mammogram enhancement are... more
Mammograms are essential radiological images used to diagnose breast cancer well in advance. However, an accurate diagnosis also depends on the quality of mammogram images. Therefore, removal of artefacts and mammogram enhancement are necessary pre-processing steps. Artefact removal helps exclude unsolicited regions in the mammograms and limits the search for suspicious regions without excessive impact from the background. Mammogram enhancements improve apparent visual details and improve some features of an image. In this paper, we propose a method for mammogram pre-processing. These pre-processed mammograms are then fed into Deep Convolutional Neural Network for the classification process. Two approaches are used and compared to classify mammograms; Training model from scratch and Transfer Learning. Transfer Learning is an excellent approach to dealing with the small-sized training set, allowing us to consume the extendibility of deep learning entirely. By employing VGG16 as a pre...
: The accurate assessment or diagnosis of breast cancer depends on image acquisition and image analysis and interpretation. The accurate assessment or diagnosis of breast cancer depends on image acquisition and image analysis and... more
: The accurate assessment or diagnosis of breast cancer depends on image acquisition and image analysis and interpretation. The accurate assessment or diagnosis of breast cancer depends on image acquisition and image analysis and interpretation. The expert radiologist makes image interpretation, and this process has been greatly benefited by computer technology. For image acquisition, various imaging modalities have been developed and used over the years. This research examines several imaging modalities and their associated benefits and drawbacks. Commonly used parameters such as sensitivity and specificity are also offered to evaluate the usefulness of different imaging modalities. The main focus of the research is on mammograms. Despite the availability of breast cancer datasets of imaging modalities such as MRI, ultrasounds, and thermograms, mammogram datasets are used mainly by the domain researcher. They are considered an international gold standard for the early detection of breast cancer. We discussed and analyzed widely used and publicly available mammogram repositories. We further discussed some common key constraints related to mammogram datasets to develop the deep learning based computer-aided diagnosis (CADx) systems for breast cancer. The ideas for their improvements have also been presented.
To fulfill the food interest of consistently expanding populace of our planet, it is important to do essential in the field of agribusiness. Traditional techniques for water systems like trench, wells, and precipitation are tedious and... more
To fulfill the food interest of consistently expanding populace of our planet, it is important to do essential in the field of agribusiness. Traditional techniques for water systems like trench, wells, and precipitation are tedious and occasional. With the help of an automated water irrigation system the water, energy, and time can be moderated. This paper presents fuzzy rule logic inference-based automated water system framework. The soil moisture, weather forecast, crop status, and water-tank level are taken as input parameters. Soil moisture and water tank level can be recorded by utilizing sensors. The fuzzy logic-based system uses eighty-one rules to identify the amount of time to irrigate the fields. The emphasis is to solve agricultural problems by employing symbolic logic and to develop a system using computer science and mathematical logic. The use of such an automated system will decline costs, water prerequisite, and give power streamlining, with expanded proficiency.
Wireless Sensor Network (WSN) is a variant of Mobile Ad-hoc Network which has strict resource constraints. In WSN, sensor nodes are scattered in the sensor field. These nodes sense parameters like humidity, pressure, sound etc and report... more
Wireless Sensor Network (WSN) is a variant of Mobile Ad-hoc Network which has strict resource constraints. In WSN, sensor nodes are scattered in the sensor field. These nodes sense parameters like humidity, pressure, sound etc and report it to the sink node. These direct form of data transmission takes significant amount of energy also nodes may sense correlated data and may report redundant data back to the sink. This book aims to identify efficient data aggregation protocol and further enhance it for achieving better network life time also to use this aggregation protocol for automation of an application like automation of water sprinklers(where based on the humidity present into the soil water will be supplied automatically). Hardware implementation of data aggregation with very small network of 3 nodes is also done using arduino micro controller. In these small experimental setup nodes can sense amount of humidity present into the soil, generates results accordingly and report i...
Multimedia has the equal threats against security as texts or raw data. In the field of information security, image encryption plays an important role. There are many image encryption algorithms available but most of them have performance... more
Multimedia has the equal threats against security as texts or raw data. In the field of information security, image encryption plays an important role. There are many image encryption algorithms available but most of them have performance and security issues. In this paper, we have analyzed six different most used image encryption algorithms and proposed our new image encryption algorithm. KeywordsImage encryption, chaotic system, transformation table, performance analysis, Rubik’s cube principle
Homomorphic encryption (HE) is an encryption technique where operations are performed on ciphertext. This encryption method can be used in varieties of applications by using public key algorithms. For transferring data from one place to... more
Homomorphic encryption (HE) is an encryption technique where operations are performed on ciphertext. This encryption method can be used in varieties of applications by using public key algorithms. For transferring data from one place to another, there are various encryption algorithms for storage of data and securing the operations, but they do not preserve privacy. HE is useful in various applications in which HE performs the different operations on encrypted data and provides results after calculations performed directly on the plaintext. Nowadays, security of information and calculations to deal with the data of big business has expanded massively. In any case, a basic issue emerges when there is a necessity of registering on such encrypted information where protection is built up. This paper represents homomorphic cryptosystems for preserving security, properties, and categories of homomorphic encryption. In addition to this, privacy-preserving applications of homomorphic crypto...
An Ad-hoc network is a collection of autonomous mobile nodes which communicates through multi-hop wireless links. Broadcasting, unicasting and multicasting are different communication techniques. There are various application where... more
An Ad-hoc network is a collection of autonomous mobile nodes which communicates through multi-hop wireless links. Broadcasting, unicasting and multicasting are different communication techniques. There are various application where collaborative or group communication is required, multicasting is the best choice to go for as compare to unicasting communication. This paper presents performance evaluation of multicast and unicast routing protocol. A network simulator NS-2.35 is used for the performance evaluation. Two performance parameters, packet delivery fraction and throughput are taken for the analysis of the AODV (unicast) and PUMA (multicast) routing protocols. Index Terms Unicast, Multicast, Ad-hoc n/w, NS 2.35
In near decades, the engineering and science professions have been hugely influenced by their responsibilities to the people. These responsibilities have send towards the protection of public welfare and healthcare. In the controls for... more
In near decades, the engineering and science professions have been hugely influenced by their responsibilities to the people. These responsibilities have send towards the protection of public welfare and healthcare. In the controls for emission of pollutants, engineers and scientists have created strategies for monitoring the environmental pollution problems. Environmental monitoring describes the activities and processes that should take place to monitor the quality of the environment. All strategies and techniques have justification and reasons which are often created to establish the status of an environment or to establish environmental parameter. In this paper, we have proposed an idea to monitor noise pollution using IoT Technique. The area covered by which the environment gets affected is noted and control and prevention practice is implemented. By controlling the environmental noise pollution the cities are deprived of health issues.
In today's world technology has advanced to such an extent that it is interchangeable with connection and convenience. ATM was one of the major breakthroughs, and over the time it has provided better convenience in fulfilling one’s... more
In today's world technology has advanced to such an extent that it is interchangeable with connection and convenience. ATM was one of the major breakthroughs, and over the time it has provided better convenience in fulfilling one’s banking needs. Although, there are certain predicaments that such ATM transactions are susceptible too. The conventional PIN based authentication that is presently accustomed in all ATM apparatus is liable to shoulder surfing, hassle in remembering the multiple PIN and the rest. The physical card brings along setbacks in particular, wearing out of the magnetic strip attributable to frequent usage, losing or getting it stolen. Aside from these there are other unlawful activities that are carried upon. The objective of this paper is to present a solution to the above stated problems. In contrast to standard architecture, the proposed solution incorporates NFC enabled smartphones as a substitute for physical card and iris based authentication for PIN.
Diabetes is a chronic disease with the potential to cause a worldwide health care crisis. According to International Diabetes Federation 382 million people are living with diabetes across the whole world. By 2035, this will be doubled as... more
Diabetes is a chronic disease with the potential to cause a worldwide health care crisis. According to International Diabetes Federation 382 million people are living with diabetes across the whole world. By 2035, this will be doubled as 592 million. Diabetes is a disease caused due to the increase level of blood glucose. This high blood glucose produces the symptoms of frequent urination, increased thirst, and increased hunger. Diabetes is a one of the leading cause of blindness, kidney failure, amputations, heart failure and stroke. When we eat, our body turns food into sugars, or glucose. At that point, our pancreas is supposed to release insulin. Insulin serves as a key to open our cells, to allow the glucose to enter and allow us to use the glucose for energy. But with diabetes, this system does not work. Type 1 and type 2 diabetes are the most common forms of the disease, but there are also other kinds, such as gestational diabetes, which occurs during pregnancy, as well as ot...
Breast cancer is one of the most common death causes amongst women all over the world. Early detection of breast cancer plays a critical role in increasing the survival rate. Various imaging modalities, such as mammography, breast MRI,... more
Breast cancer is one of the most common death causes amongst women all over the world. Early detection of breast cancer plays a critical role in increasing the survival rate. Various imaging modalities, such as mammography, breast MRI, ultrasound and thermography, are used to detect breast cancer. Though there is a considerable success with mammography in biomedical imaging, detecting suspicious areas remains a challenge because, due to the manual examination and variations in shape, size, other mass morphological features, mammography accuracy changes with the density of the breast. Furthermore, going through the analysis of many mammograms per day can be a tedious task for radiologists and practitioners. One of the main objectives of biomedical imaging is to provide radiologists and practitioners with tools to help them identify all suspicious regions in a given image. Computer-aided mass detection in mammograms can serve as a second opinion tool to help radiologists avoid running...
Breast cancer is one of the most common death causes amongst women all over the world. Early detection of breast cancer plays a critical role in increasing the survival rate. Various imaging modalities, such as mammography, breast MRI,... more
Breast cancer is one of the most common death causes amongst women all over the world. Early detection of breast cancer plays a critical role in increasing the survival rate. Various imaging modalities, such as mammography, breast MRI, ultrasound and thermography, are used to detect breast cancer. Though there is a considerable success with mammography in biomedical imaging, detecting suspicious areas remains a challenge because, due to the manual examination and variations
in shape, size, other mass morphological features, mammography accuracy changes with the density of the breast. Furthermore, going through the analysis of many mammograms per day can be a tedious task for radiologists and practitioners. One of the main objectives of biomedical imaging is to provide radiologists and practitioners with tools to help them identify all suspicious regions in a given image. Computer-aided mass detection in mammograms can serve as a second opinion tool to help radiologists avoid running into oversight errors. The scientific community has made much progress in this topic, and several approaches have been proposed along the way. Following a bottom-up narrative, this paper surveys different scientific methodologies and techniques to detect suspicious regions in mammograms spanning from methods based on low-level image features to the most recent novelties in AI-based approaches. Both theoretical and practical grounds are provided across the paper sections to highlight the pros and cons of different methodologies. The paper’s main scope is to let readers embark on a journey through a fully comprehensive description of techniques, strategies and datasets on the topic.
Machine learning is one of the break-through technologies of the modern digital world. It's applications are found in various research domain such as medicine, image processing, production and manufacturing, aviation and autonomics... more
Machine learning is one of the break-through technologies of the modern digital world. It's applications are found in various research domain such as medicine, image processing, production and manufacturing, aviation and autonomics and many more. To efficiently run a machine, it's maintenance and its monitoring automation system play a key role. The major problem we are targetting is to overcome the lack of an automation system which can give an accuracy rate of the production machine at a given instance of time. Also, the important energy meter parameters required to make power report in an automation system for addressing the production issues, at a given interval of time, were also not recorded. Thus in this paper, we describe how machine learning techniques are used for prediction of the accuracy of running production machine. To address these issues, we have used supervised machine learning technique of Binary decision tree using CART method and for power report, while t...