125 research outputs found

    Evaluation of the quality of an image encrytion scheme

    Get PDF
    Encryption systems have been developed for image viewing applications using the Hill Cipher algorithm. This study aims to evaluate the image encryption quality of the Hill Cipher algorithm. Several traditional metrics are used to evaluate the quality of the encryption scheme. Three of such metrics have been selected for this study. These include, the Colour Histogram, the Maximum Deviation (comparing the original image) and the Entropy Analysis of the encrypted image. Encryption quality results from all three schemes using a variety of images show that a plain Hill Cipher approach gives a good result for all kinds of images but is more suited for colour dense images

    Entropy in Image Analysis III

    Get PDF
    Image analysis can be applied to rich and assorted scenarios; therefore, the aim of this recent research field is not only to mimic the human vision system. Image analysis is the main methods that computers are using today, and there is body of knowledge that they will be able to manage in a totally unsupervised manner in future, thanks to their artificial intelligence. The articles published in the book clearly show such a future

    The Effect of Emotional Intelligence Training via Method Psychodrama on Marital Satisfaction of Patients with MS

    Get PDF
    MS is a progressive and chronic disease of the central nervous system with symptoms that can be debilitating. Appropriate interventions including Emotional Intelligence Training improve the quality of life MS patients. The aim of this study is to determine the effect of emotional intelligence training through Psycho-Drama methods on marital satisfaction of patients with MS. This study is a one-group, before-after, quasi-experimental study. A total of 22 patients were enrolled in this study. The samples were selected through non-random sampling based on the goal of study among visitors of MS Society, Kurdistan province, Iran. Data collection tool was questionnaires with two sections: 1) demographic information and 2) ENRICH-B marital satisfaction questionnaire including 47 items. Intervention was conducting 20 sessions of 2-hour training. Questionnaires were filled by patients before and after intervention. Methods for data analysis were descriptive statistics (tables of relative frequency distribution, the mean, and standard deviation) and inferential statistics of paired t test. Paired t test showed a significant difference in total scores of marital satisfaction before and after training sessions (P < 0.05). Finally, we concluded that, designing and applying emotional intelligence training programs via psychodrama method is effective on marital satisfaction in patients with multiple sclerosis. Keywords: Multiple sclerosis, emotional intelligence training, psychodrama, marital satisfactio

    True Believers at Law: National Security Agendas, the Regulation of Lawyers, and the Separation of Powers

    Get PDF
    Ideological agendas distort the deliberation required for sound legal advice about national security. Elite government lawyers after September 11 advanced a theory at the expense of context, labeling legal constraints as lawfare against American interests. The lawfare critics failed to recognize that legal constraints can empower decision makers by reinforcing reputational and other long-term values. They also failed their history test, ignoring the lessons of presidents from Jefferson to Kennedy who rejected a rigid adherence to ideology in the national security realm. By discounting context, the construction of the lawfare paradigm produced dire results, including the torture memos drafted by the Justice Department\u27s Office of Legal Counsel ( OLC ) and the destruction of CIA interrogation tapes. Unfortunately, this elevation of ideology over context has failed to yield adequate remedies. Tort litigation, exemplified by Jose Padilla\u27s recent lawsuit against former OLC attorney John Yoo, risks personalizing the problem and neglecting systemic issues. The informal norms approach suggested by a number of OLC alumni, while offering a number of excellent proposals such as citing and distinguishing adverse authority, has not attracted stakeholders across the political spectrum. A structural reform approach that replaces OLC with an adjudicative entity may produce an inquisitorial tribunal that lacks sharp adversarial inputs and loses influence to more pliable players such as White House counsel. To transcend these difficulties, lawyers should turn to a model of dialogic equipoise relying on two values: transparency and tailoring. Dialogic equipoise allows the President to take action that is consistent with the most accurate reading of sources of authority. Action, however, must be both interstitial-with a clear exit strategy and publicly disclosed. To implement the dialogic equipoise model, this Article recommends an integrated approach, including a safe harbor for publicly disclosed legal opinions, consideration of institutional consequences, assertion of the least drastic rationale for executive power, and an ex ante role for Inspectors General and the OLC in document preservation. This blended regime can counter ideology\u27s corrosive influence on legal deliberation about war, peace, and national security

    Advanced Mathematics and Computational Applications in Control Systems Engineering

    Get PDF
    Control system engineering is a multidisciplinary discipline that applies automatic control theory to design systems with desired behaviors in control environments. Automatic control theory has played a vital role in the advancement of engineering and science. It has become an essential and integral part of modern industrial and manufacturing processes. Today, the requirements for control precision have increased, and real systems have become more complex. In control engineering and all other engineering disciplines, the impact of advanced mathematical and computational methods is rapidly increasing. Advanced mathematical methods are needed because real-world control systems need to comply with several conditions related to product quality and safety constraints that have to be taken into account in the problem formulation. Conversely, the increment in mathematical complexity has an impact on the computational aspects related to numerical simulation and practical implementation of the algorithms, where a balance must also be maintained between implementation costs and the performance of the control system. This book is a comprehensive set of articles reflecting recent advances in developing and applying advanced mathematics and computational applications in control system engineering

    Low Power Memory/Memristor Devices and Systems

    Get PDF
    This reprint focusses on achieving low-power computation using memristive devices. The topic was designed as a convenient reference point: it contains a mix of techniques starting from the fundamental manufacturing of memristive devices all the way to applications such as physically unclonable functions, and also covers perspectives on, e.g., in-memory computing, which is inextricably linked with emerging memory devices such as memristors. Finally, the reprint contains a few articles representing how other communities (from typical CMOS design to photonics) are fighting on their own fronts in the quest towards low-power computation, as a comparison with the memristor literature. We hope that readers will enjoy discovering the articles within

    Australian votes in the making: a critical review of voter behaviour research in Australia

    Get PDF
    Raphaella Kathryn Crosby conducted a critical review of the theory and method of voter behaviour research, with a focus on the 2019 Australian federal election. She found there was little agreement or consensus among the research, and no common narrative of the election. Using a Grounded Theory approach she identified five distinct battlegrounds of the 2019 election, and proposed two new theories to explain seemingly illogical voter behaviour

    Chaotic Dynamical Systems: Control and Synchronization

    Get PDF
    Chaos is a typical phenomenon of nonlinear systems and is currently widely studied, because of its features and many potential applications. The main aim of this thesis concerns principally two major subjects. the first is to deploy a method for uncovering a hidden bifurcation in a multispiral Chua system with a sine function that is based on the famous paper by Menacer et al. This method is based on the core idea of Leonov and Kuznetsov for searching hidden attractors while keepin

    Data Politics

    Get PDF
    Data has become a social and political issue because of its capacity to reconfigure relationships between states, subjects, and citizens. This book explores how data has acquired such an important capacity and examines how critical interventions in its uses in both theory and practice are possible. Data and politics are now inseparable: data is not only shaping our social relations, preferences and life chances but our very democracies. Expert international contributors consider political questions about data and the ways it provokes subjects to govern themselves by making rights claims. Concerned with the things (infrastructures of servers, devices, and cables) and language (code, programming, and algorithms) that make up cyberspace, this book demonstrates that without understanding these conditions of possibility it is impossible to intervene in or to shape data politics. Aimed at academics and postgraduate students interested in political aspects of data, this volume will also be of interest to experts in the fields of internet studies, international studies, Big Data, digital social sciences and humanities

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms
    • …
    corecore