3,316 research outputs found

    Query management in a sensor environment

    Get PDF
    Traditional sensor network deployments consisted of fixed infrastructures and were relatively small in size. More and more, we see the deployment of ad-hoc sensor networks with heterogeneous devices on a larger scale, posing new challenges for device management and query processing. In this paper, we present our design and prototype implementation of XSense, an architecture supporting metadata and query services for an underlying large scale dynamic P2P sensor network. We cluster sensor devices into manageable groupings to optimise the query process and automatically locate appropriate clusters based on keyword abstraction from queries. We present experimental analysis to show the benefits of our approach and demonstrate improved query performance and scalability

    Image Encryption Algorithm with Plaintext Related Chaining

    Get PDF
    This paper describes a plaintext related image encryption algorithm that utilizes the Mojette transform for computation of bins that are subsequently combined with pixels of the processed image. While the bins are computed solely from pixel intensities of a plain image and also the combination depends only on intensities of plain image pixels, the parameters of bins are rearranged according to used key. This design results in a great sensitivity of the proposed image encryption algorithm to both plain images and keys, which is verified by a set of experiments. The paper also tests the resistance of the proposal against statistical and differential attacks by means of commonly used measures as correlation coefficients, entropy, NPCR and UACI. Furthermore, the paper analyses computation speed reached by the proposed solution. Computed values of all parameters are discussed and then compared with results obtained by some recent plaintext related image encryption algorithms

    Getting the message across : ten principles for web animation

    Get PDF
    The growing use of animation in Web pages testifies to the increasing ease with which such multimedia components can be created. This trend indicates a commitment to animation that is often unmatched by the skill of the implementers. The present paper details a set of ten commandments for web animation, intending to sensitise budding animators to key aspects that may impair the communicational effectiveness of their animation. These guidelines are drawn from an extensive literature survey coloured by personal experience of using Web animation packages. Our ten principles are further elucidated by a Web-based on-line tutorial

    Recent Advancements on Symmetric Cryptography Techniques -A Comprehensive Case Study

    Get PDF
    Now a day2019;s Cryptography is one of the broad areas for researchers; because of the conventional block cipher has lost its potency due to the sophistication of modern systems that can break it by brute force. Due to its importance, several cryptography techniques and algorithms are adopted by many authors to secure the data, but still there is a scope to improve the previous approaches. For this necessity, we provide the comprehensive survey which will help the researchers to provide better techniques
    corecore