127 research outputs found

    Implementation and evaluation of EMAES – A hybrid encryption algorithm for sharing multimedia files with more security and speed

    Get PDF
    In this era of smartphones, a huge amount of multimedia files like audio, video, images, animation, and plain text are shared. And with this comes the threat of data being stolen and misused. Most people don’t think about the security of data before uploading it to any platform. Most apps used on smartphones upload our data to their server. Not only this, but other third-party apps can also read that data while it is being transmitted. One solution to this problem is encrypting the data before sharing it and decrypting it back at the other end so that even if it is intercepted in between the transmission, it would be impossible to decrypt it. In this paper, a newly designed hybrid encryption algorithm EMAES that includes the efficiency of MAES (Modified Advanced Encryption Standard) and security of ECC (Elliptic Curve Cryptography) was implemented in MATLAB as well as in android studio 4.0. using a mobile messaging application. Also, it was tested for different speeds and security parameters. Further, it was compared with standard algorithms like the RC4, RC6 and Blowfish as well as with other hybrid algorithms like RC4+ECC, RC6+ECC and Blowfish+ECC. The EMAES was found 30% more efficient in terms of encryption and decryption time. The security of EMAES also showed improvement when compared with other hybrid algorithms for parameters like SSIM (structural similarity index measure), SNR (Signal to Noise Ratio), PSNR(Peak Signal to Noise Ratio), MSE (Mean Squared Error) and RMSE (Root Mean Squared Error). And finally, no significant improvement was found in the CPU and RAM usage

    CMRF: analyzing differential gene regulation in two group perturbation experiments

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Prediction methods are increasingly used in biosciences to forecast diverse features and characteristics. Binary two-state classifiers are the most common applications. They are usually based on machine learning approaches. For the end user it is often problematic to evaluate the true performance and applicability of computational tools as some knowledge about computer science and statistics would be needed.</p> <p>Results</p> <p>Instructions are given on how to interpret and compare method evaluation results. For systematic method performance analysis is needed established benchmark datasets which contain cases with known outcome, and suitable evaluation measures. The criteria for benchmark datasets are discussed along with their implementation in VariBench, benchmark database for variations. There is no single measure that alone could describe all the aspects of method performance. Predictions of genetic variation effects on DNA, RNA and protein level are important as information about variants can be produced much faster than their disease relevance can be experimentally verified. Therefore numerous prediction tools have been developed, however, systematic analyses of their performance and comparison have just started to emerge.</p> <p>Conclusions</p> <p>The end users of prediction tools should be able to understand how evaluation is done and how to interpret the results. Six main performance evaluation measures are introduced. These include sensitivity, specificity, positive predictive value, negative predictive value, accuracy and Matthews correlation coefficient. Together with receiver operating characteristics (ROC) analysis they provide a good picture about the performance of methods and allow their objective and quantitative comparison. A checklist of items to look at is provided. Comparisons of methods for missense variant tolerance, protein stability changes due to amino acid substitutions, and effects of variations on mRNA splicing are presented.</p

    Mouse Gesture Recognition for Human Computer Interaction

    Get PDF
    In the field of Computer Science and Information Technology, it goes without saying that the focus has been shifted from the System Oriented software to the User Oriented software. Naturally, for such software applications, the importance of User Experience has gained a paradigm shift. The paper highlights the significance of a seamless interaction between the user and the computer by proposing a reliable algorithm for performing basic operations by drawing gestures with a mouse. It aims to embrace simplicity and quick access using gestures and providing effortless interaction for the uniquely abled users. The core of the algorithm comes from the Hidden Markov Model, which is emblematic of a probabilistic approach for gesture recognition. DOI: 10.17762/ijritcc2321-8169.15050

    Observations on the fish and prawn seed resources of the Gulf of Kutch and their utilization in aquaculture

    Get PDF
    The characteristics of the fish and prawn seed resources of the Gulf of Kutch are described. Results of experiments conducted in a primary low saline reservoir of a solar salt works to study their utility for aquaculture are reported. The prospective role of aquaculture in augmenting fish production along the coast is also discussed

    Delivery of an online psychosocial recovery program during COVID‐19 : a survey of young people attending a youth mental health service

    Get PDF
    Aims: The COVID-19 pandemic forced the rapid move of mental health services to being delivered online. This included the delivery of a psychosocial recovery program (PRP) delivered in youth mental health services in Melbourne, Australia which consists of groups that address functional recovery. At the time, there was limited evidence about how this switch in service provision would be received by service users or what impact the pandemic was having on their mental health. Methods: Young people engaged with the PRP between March and May 2020 were sent a link to complete an online survey that was co-developed by young people and clinicians. Attendance data at groups were extracted as a proximal measure of feasibility and acceptability. Results: A total of 44 young people undertook the survey with the domains of wellbeing most impacted by lockdown being work/study, motivation and social connection. Groups provided online were generally well attended during lockdown, particularly those that had a focus on therapeutic content. Young people indicated little preference for continuing to attend groups run purely online when restrictions eased, with many expressing a preference for these to be offered face-to-face or in a combined format. Conclusions: These findings suggest that implementation of online psychosocial groups during periods of lockdown is both feasible and acceptable. Whilst young people found accessing groups online to be of benefit at the time, they felt that continued substitution of face-to-face groups would not necessarily be preferable and clinical services should consider these preferences in their long-term service delivery

    Review and Meta-Analyses of TAAR1 Expression in the Immune System and Cancers

    Get PDF
    Since its discovery in 2001, the major focus of TAAR1 research has been on its role in monoaminergic regulation, drug-induced reward and psychiatric conditions. More recently, TAAR1 expression and functionality in immune system regulation and immune cell activation has become a topic of emerging interest. Here, we review the immunologically-relevant TAAR1 literature and incorporate open-source expression and cancer survival data meta-analyses. We provide strong evidence for TAAR1 expression in the immune system and cancers revealed through NCBI GEO datamining and discuss its regulation in a spectrum of immune cell types as well as in numerous cancers. We discuss connections and logical directions for further study of TAAR1 in immunological function, and its potential role as a mediator or modulator of immune dysregulation, immunological effects of psychostimulant drugs of abuse, and cancer progression

    Terrorism, governmentality and the simulated city: the Boston Marathon bombing and the search for suspect two

    Get PDF
    This article examines the online circulation of a photograph of the immediate aftermath of the 2013 Boston Marathon bombings taken by David Green, a Boston Marathon runner. The photograph fortuitously captured an image of Dzhokhar Tsarnaev, the younger Tsarnaev brother, running from the scene. Initially, Tsarnaev went unnoticed by online message board users and FBI investigators – he was just another face in the urban crowd. However, after he was identified as suspect two, he emerged in the photograph as the figure of terror, the condensed embodiment of the spectacular attack, and thus as a spectre, a figure whose appearance in the archive of the past haunts the future. The author examines how this spectral emergence simultaneously reveals the attack terrorism launches against everyday mediations and how everyday mediations respond to terrorist spectacle. He argues that photography sustains vernacular practices that also support the practices of urban governmentality. Understanding urban governmentality thus requires attending to the urban archive of visual mediation in which the relationships between past and present, image and reality, and surveillance and spectacle are always contingent and open to revision
    corecore