Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
87 result(s) for "COMPUTERS / Data Transmission Systems / Electronic Data Interchange."
Sort by:
Computation and Communication Technologies
This conference proceedings summarizes invited publications from the two IDES (Institute of Doctors Engineers and Scientists) International conferences, both held in Bangalore/ India.
A novel design of audio signals encryption with substitution permutation network based on the Genesio-Tesi chaotic system
The concept of encryption is as old as the reality that confidential information has been interchanging among people. The art of transferring secret information between two parties or groups is known as cryptography. It contains the algorithms, key exchange protocols, and approaches to consistently and securely avoid unauthorized access to confidential information. Nowadays information is in digital form, therefore this factor necessitates some cryptographic algorithms for secure data transmission. In this work, we have designed a new approach for audio encryption to securely store and transfer audio signals. The suggested encryption algorithm is primarily based on Gensio-Tesi chaotic map. Substitution and permutation networks are engendered by the Gensio-Tesi chaotic system for the encryption of signals. The other important feature discussed here is the performance of offered algorithm which is ascertained by some extensive audio analysis. Experimental results reveal that the designed scheme has an essential level of security.
An intelligent tracking system based on internet of things for the cold chain
Purpose – Monitoring the real-time temperature, humidity, and physical position status of goods is vital in the cold chain. Diverse logistics technologies and systems have been adopted in the cold chain for monitoring perishable goods. However, these technologies and systems are independent from each other. Data and information in them are not integrated so that information control is not effective. The paper aims to discuss these issues. Design/methodology/approach – By integrating Internet of Things and tracking technologies, this paper proposes an intelligent tracking system, which is designed to achieve effective and fast live monitoring of goods in the cold chain at the lowest cost and with the largest network capacity and simplest protocols. Findings – Structure and information platform design mechanism are introduced. The key part of this system is a wireless sensor network built on Zigbee. Wireless sensors located in cold storages or refrigerated trucks are able to collect and transmit live data quickly and efficiently. Originality/value – Users of the proposed system can easily monitor goods transported in cold chains. In addition, the system assigns specific servers to save historical data for inquiries.
An Image Decompression Model with Reversible Pixel Interchange Decryption Model Using Data Deduplication
The images may or may not be confidential if communications occur via images. But it becomes complicated when we want to convey a picture, which only the sender and the recipient must know. Since data that have been sent during transmission can be lost or an individual may hack and misuse this picture. Safety of the data is important in such scenarios. In order to reduce storage space and costs, imaging deduplication (DD) technology is proposed. The concept of convergent encryption and decryption was suggested to protect the confidentiality of the image. The deduplication scheme encrypts/recodes an image with a convergent encryption/decryption key obtained from computing the hash value of the content of the image. Implementing DD over encrypted/decrypted data is a major challenge to optimize storage efficiently in a highly secured way in an integrated storage and computer environment. The original image is segmented into blocks of same size during the initial step, and sub classification is performed for accurate image extraction within the limits. The pixels of neighboring sub blocks are swapped using a random matrix. Following that, each pixel is randomly exchanged for neighboring blocks using a random matrix, and each block is encrypted using the suggested function before being sent to the receiver. In this manuscript, an Image Decompression Model with Reversible Pixel Interchange Decryption model using Data Deduplication (IDRPID-DD) is introduced that provides security during storage and data transmission. The proposed model is compared with the traditional methods and the results show that the proposed model deduplication identification and eradication levels are high and the proposed decryption model is strong.
Identity is the new money
This book argues that identity and money are both changing profoundly. Because of technological change the two trends are converging so that all that we need for transacting will be our identities captured in the unique record of our online social contacts. Social networks and mobile phones are the key technologies. They will enable the building of an identity infrastructure that can enhance both privacy and security - there is no trade-off. The long-term consequences of these changes are impossible to predict, partly because how they take shape will depend on how companies take advantage of business opportunities to deliver transaction services. But one prediction made here is that cash will soon be redundant - and a good thing too. In its place we will see a proliferation of new digital currencies.
A global race to dominate the internet of things: how China caught up
Purpose In the ongoing Industry 4.0 era, the internet of things (IoT) has become a global race in the current information technology climate. However, little is understood about the pattern of the global competitive arena or its players’ set up strategy. This paper aims to attempt to compare the cross-country development of the IoT industry. In particular, from the lens of industrial policies, this paper highlights how China, as a latecomer, gains momentum to emerge victorious as a leader in this global race. Design/methodology/approach Based on five dimensions, namely, foundation, trajectory, characteristic, application and social impacts, this paper presents the evolution of the IoT industry in the USA, European Union, Japan, South Korea and China. From the lens of windows of opportunities, this paper analyzes how China seized the opportunity with the emerging technology, thereby, enabling it to create a competitive advantage. Findings This paper finds that China’s IoT industry takes a distinct trajectory, where scientific institutions, enterprises and governmental policies collaborate in unison, during which the first phase was when scientific research institutions introduced the conceptual new technology from developed countries. This technological foresight allowed for the identification and realization of critical technologies, strategic fields and technological trends. The second phase was the continuous dissatisfaction of capabilities of critical technologies, which creates disruptions that significantly altered the environment of technological competition. Originality/value This paper provides a comprehensive and comparative review of IoT industries in a global context, with the critical and influential role of the windows of opportunities on those enterprises lagging behind the technological wave.
Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices
Internet of things technology has recently drawn much attention across industries. IoT technology has gradually been applied to industries and everyday life in general including healthcare, where people can access hospital information systems to view personal health and medical information. Still, due to security vulnerabilities, personal health and medical information is prone to hacking attacks. Thus, concerns over privacy invasion have come to the fore, and at the same time security issues are considered to override information services. This paper proposes a communication protocol based on hash lock, session keys, random numbers and security keys designed to be safe against intruders’ hacking attempts in information communication between medical devices. Instead of arguing for the safety of the proposed protocol with mathematical theorem proving as in prior research on protocol proving, this paper verifies the safety of the proposed authentication protocol against a range of attacks using a model checking program, Casper/FDR program. In brief, the proposed communication protocol for medical devices is safe and secure against diverse attacks.
Image Blocking Encryption Algorithm Based on Laser Chaos Synchronization
In view of the digital image transmission security, based on laser chaos synchronization and Arnold cat map, a novel image encryption scheme is proposed. Based on pixel values of plain image a parameter is generated to influence the secret key. Sequences of the drive system and response system are pretreated by the same method and make image blocking encryption scheme for plain image. Finally, pixels position are scrambled by general Arnold transformation. In decryption process, the chaotic synchronization accuracy is fully considered and the relationship between the effect of synchronization and decryption is analyzed, which has characteristics of high precision, higher efficiency, simplicity, flexibility, and better controllability. The experimental results show that the encryption algorithm image has high security and good antijamming performance.
Harmonised information exchange between decentralised food composition database systems
Background/Objectives: The main aim of the European Food Information Resource (EuroFIR) project is to develop and disseminate a comprehensive, coherent and validated data bank for the distribution of food composition data (FCD). This can only be accomplished by harmonising food description and data documentation and by the use of standardised thesauri. Subjects/Methods: The data bank is implemented through a network of local FCD storages (usually national) under the control and responsibility of the local (national) EuroFIR partner. Results: The implementation of the system based on the EuroFIR specifications is under development. The data interchange happens through the EuroFIR Web Services interface, allowing the partners to implement their system using methods and software suitable for the local computer environment. The implementation uses common international standards, such as Simple Object Access Protocol, Web Service Description Language and Extensible Markup Language (XML). A specifically constructed EuroFIR search facility (eSearch) was designed for end users. The EuroFIR eSearch facility compiles queries using a specifically designed Food Data Query Language and sends a request to those network nodes linked to the EuroFIR Web Services that will most likely have the requested information. The retrieved FCD are compiled into a specifically designed data interchange format (the EuroFIR Food Data Transport Package) in XML, which is sent back to the EuroFIR eSearch facility as the query response. The same request–response operation happens in all the nodes that have been selected in the EuroFIR eSearch facility for a certain task. Finally, the FCD are combined by the EuroFIR eSearch facility and delivered to the food compiler. Conclusions: The implementation of FCD interchange using decentralised computer systems instead of traditional data-centre models has several advantages. First of all, the local partners have more control over their FCD, which will increase commitment and improve quality. Second, a multicentred solution is more economically viable than the creation of a centralised data bank, because of the lack of national political support for multinational systems.