19 research outputs found

    Enhancement to the patient's health care image encryption system, using several layers of DNA computing and AES (MLAESDNA)

    Get PDF
    Keeping patient health data private has been a big issue for decades, and this issue will not go away anytime soon. As an integral part of many developing technologies, cryptographic Internet communications ICs (e.g. fog computing and cloud computing) are a main focus of IoT research. Just keep trying all the potential keys until you find the correct one. New and future technologies must have a model of DNA cryptography in order to assure the efficient flow of these technologies. Public-key cryptography is also required to make DNA sequence testing devices for the Internet of Things interoperable. This method employs DNA layers and AES in such a way that it may be easier to design a trustworthy hybrid encryption algorithm that uses DNA layers and AES. In order to guard against brute-force decryption attacks, DNA sequences are encrypted using three keys: (I) the main key, which is the key to the AES encryption algorithm; (II) the rule 1 key, which is the base DNA structure; and (III) the rule 2 key, which is the DNA helical structure binding probability. This key was created with increased security in mind. multi-layered AES encryption and DNA computing were applied to "Covid 19" images in this research (MLAESDNA). With cloud computing, the MLAESDNA team was able to show that IoT signals could be enhanced with encrypted data

    A Survey of ARX-based Symmetric-key Primitives

    Get PDF
    Addition Rotation XOR is suitable for fast implementation symmetric –key primitives, such as stream and block ciphers. This paper presents a review of several block and stream ciphers based on ARX construction followed by the discussion on the security analysis of symmetric key primitives where the best attack for every cipher was carried out. We benchmark the implementation on software and hardware according to the evaluation metrics. Therefore, this paper aims at providing a reference for a better selection of ARX design strategy

    An Improved Fully Homomorphic Encryption Scheme for Cloud Computing

    Get PDF
    Business in cloud computing is very popular among Small and Medium Enterprises (SMEs). By leveraging services from the cloud, such companies can migrate all of their in-house operations to cloud at low costs with minimum IT facility requirements such as desktop machines and the Internet. Even though the cloud promises tremendous advantages in terms of computing resources and storage spaces, some of the companies are still reluctant to adopt such a technology because of security concerns. To overcome such problems, a fully homomorphic encryption (FHE) scheme with improved efficiency can be implemented as the scheme allows computation on encrypted data without decryption. In this paper, we propose an improved FHE scheme that uses a symmetric key for encryption together with a protocol to implement the scheme. Furthermore, we also provide an analysis regarding to the noise growth in the processed ciphertext and squashing technique that is required to reduce the noise. This analysis is essential to improve the efficiency of the scheme as the squashing technique is time-consuming

    Mobile Robot Navigation System Vision Based Through Indoor Corridors

    Get PDF
    Nowadays, industry has been moving toward fourth industry revolution, but surveillance industry is still using human in patrol. This will put this industry in risk due to human nature instincts. By using a mobile robot with assist of vision sensor to patrol can bring this industry to a new level. However, the indoor corridor navigation will become a big challenge to this method. The objective of this project is to develop a navigation system using vision sensor and navigate the mobile robot in indoor corridor environment. To perform this operation, a control system though the WLAN communication develop to guide the movement of mobile robot. Besides that, corridor following system with vision sensor that using Sobel edge detection method and Hough transform to getting the vanish point is needed to help the robot to safely travel in the corridor. Both systems can be using MATLAB to be execute and link with the mobile robot through WLAN connection. This system can be analysis the corridor condition base on different feature and can decide to drive the mobile car in the direction that given. The image capture by mobile robot can be stream to MATLAB in real time and receive a feedback in short time

    Second Level Password Generator

    Get PDF
    Password gives user access to the university computing services. Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. The intruder with the necessary knowledge, experience, and tools gains entry to a system, he or she may be able to monitor other machines and systems on the same network and capture information about local users logging on to those machines. And if these users then connect to other networks, the intruder has the potential to penetrate and monitor the remote systems to which the local users connect, thereby increasing the likelihood of a breach in the security of those systems as well. Therefore, it is important to have a second level security to the user's password. Cryptography is an art to convert a message into other forms by using some algorithms. It is used widely in many fields such as securing message before sending through email, sending confidential documents or letters through networks, doing business online and etc. The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). The purpose of choosing AES and DES is because they are two of the most popular algorithms for modern encryption

    Develop And Implementation Of Pc Based Controller For Humanoid Robot Using Digital Potentiometer

    Get PDF
    This paper introduced to develop and implementation of PC based controller for humanoid robot using digital potentiometer. The main objective in this paper is to develop and implement the joystick controller by using a digital potentiometer circuit board that be able to control the humanoid robot movement. The Arduino board and digital potentiometer will be integrate by connecting both pins in between wiper, W pin and ground, GND to the DB9 pins of remote control platform, which is TX and RX pins respectively. Humanoid robot as known as TOMY i-SOBOT is use as a preferred model due to wide usage in many applications. A digital potentiometer will be transmitted the voltage and current value depend on the digital level through serial communication to give the instruction for humanoid robot movement. The humanoid movement based on Guided User Interface (GUI) where the user give a commands by pressing the button on the GUI such as turn left, right, forward, and reverse. The results show that the humanoid movement able to control based on the voltage and current in a digital potentiometers value

    Automated Quality Inspection On Tile Border Detection Using Vision System

    Get PDF
    Most of the ceramic tile industry still doing the quality control by manually. The accuracy of the manual inspection by human is lower due to the harsh industrial environment with noise, extreme temperature and humidity. A camera should replace the human eyes to recognise the defect tile effectively. Thus, a suitable method have to investigate for implementing this function. This project aim to design and develop an automated quality inspection in ceramic tile industry using vision system. The performance of the system is analysed. An Imaging Source CMOS industrial camera is use to capture the tile border. Image processing with edge detection technique is use to analyse the captured image of tile border and identify the defective tiles. The image filtering and intensity of the light are adjust to evaluate the performance of the system. The overall automation process involves image capturing, image processing, and decision making. The defect detection algorithms are develop to differentiate the defective tile based on the edge detection technique. The system using background subtraction method has achieved 50% accuracy in identify the status of tile since it consist of many limitation. By evaluate the gradient variation on the tile border edge, the accuracy of the defect detection has achieved 80% in identify the tile conditio

    Vision Based Obstacle Avoidance For Mobile Robot Using Optical Flow Process

    Get PDF
    The paper is discuss on develop and implement a vision based obstacle avoidance for mobile robot using optical flow process. There are four stages in this project which are image pre-processing, optical flow process, filtering, object stance measuring and obstacle avoidance. The optical flow process are an image resizing, set parameters, convert color to grayscale, Horn-Schunk method and change grayscale image to binary number. Next process is a filtering done by smoothing filter then image center will be defined. The maximum distance object from a camera has been set as 20 cm. Therefore, the decisions of the robot to move whether left or right are based on the direction of optical flow. This avoidance algorithm allows the mobile robot to avoid the obstacles which are in different shape either square or rectangular. A friendly graphical user interface (GUI) had been used to monitor the activity of mobile robot during run the systems

    Optimum Utilization Of Energy Consumption In Arm Robot

    Get PDF
    This paper introduced on how to minimize the energy and performance of arm robot. The objective is to design the optima; performance of the arm robot movement in performing certain tasks. There are three process involved in minimize the energy which are hardware assembly selection, Denavit Haternberg (D-H) parameters and optimization process of robot movements. A 3 degree of freedom ROB0036 robot arm is use as hardware selection. Then determine the Denavit Haternberg (D-H) parameters for robot through theoretical, simulation and practical forward and inverse kinematics. The optimization process involved how to control parameters know as position angle and the speed of motor of three main axes of arm robot. The performance is measured respect to the two movement, which are reference and optimized. The energy efficiency analysis is performs to reduce this energy consumed. The simulation resulted show that the minimum motor’s movement of joint, the less time taken to achieve of to complete the pick and place task. Directly, it results on less energy used and increase the robot arm performance

    Solution Manual of Engineering Mathematics (module 5)

    Get PDF
    One of the most challenging aspects of mathematics learning is to give students suitable examples and exercises which can improve their understanding. This solution manual of Engineering Mathematics is designed to serve as a study guide for engineering students of Universiti Teknikal Malaysia Melaka (UTeM). The topics are based on the syllabus of Engineering Mathematics teaching in UTeM. The material in this book will cover questions and answers for: Function of Several Variables Multiple Integral Vector An excellent student must have an initiative to learn before being taught by lecturers. By using this manual, students can be more prepared before attending a tutorial session. The examples are presented in a sequence of steps with full details so that students can follow systematically
    corecore