35 research outputs found

    Review of different approaches for optimal performance of multi-processors

    Get PDF
    We reviewed the literature used for optimal performance of multi-processor, we study different approaches in this paper. They include rate monotonic, deadline monotonic, and Earliest deadline first Algorithm. These approaches are basically used for real time scheduling systems .The problem of inconsistencies occurring in these algorithms such as those tasks whose task period is less but if not executed does not matter and whenever they are scheduled under rate monotonic scheduling algorithm the time consumed by CPU in scheduling the tasks is spent unnecessarily

    Intertwining and NCA maps based new image encryption scheme

    Get PDF
    In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common now. However, transmitting sensitive information over the Internet is always vulnerable to different kind of attacks. In order to address such issues, cryptographers are proposing encryption techniques. In encryption, data is manipulated in such a way that intruders cannot access the original information. This paper presents a secure image encryption scheme via Intertwining and Nonlinear Chaotic Maps (NCA). Both main steps i.e., confusion and diffusion are implemented using chaotic maps. Numerous security parameters are applied to the proposed improved technique and strength of the scheme is evaluated. All experimental results proved the robustness and higher security of the proposed chaos-based scheme

    Numerical investigation of semiempirical relations representing the local Nusselt number magnitude of a pin fin heat sink

    Get PDF
    Heat transfer augmentation study using air jet impingement has recently attained great interest toward electronic packaging systems and material processing industries. The present study aims at developing a nondimensional semiempirical relation, which represents the cooling rate (Nu) in terms of different geometric and impinging parameters. The spacing of the fin (S/dp) and the fin heights (H/dp) are the geometric parameters, while the impinging Reynolds number (Re) and nozzle‐target spacing (Z/d) are the impinging parameters. During the plot of the Nusselt profile, three vital secondary peaks are observed due to local turbulence of air over the heat sink. To incorporate this nonlinear behavior of the Nusselt profile in developing nondimensional empirical relations, the Nusselt profiles are divided into different regions of secondary rise and fall. Four different sets of the semiempirical relation using regression analysis are proposed for Z/d ≤ 6, H/dp ≤ 4.8 with S/dp ≤ 1.58, S/dp > 1.58 and for Z/d > 6, H/dp > 4.8 with S/dp ≤ 1.58, S/dp > 1.58. These empirical relations benefit the evaluation of the cooling rate (Nu) without any experimentation or simulation

    A novel chaos-based partial image encryption scheme using Lifting Wavelet Transform

    Get PDF
    Depending on applications and specific security requirements, digital images can either be fully or partially encrypted. Partial encryption is one of the methods that reduces computational and processing cost. To achieve partial encryption, chaotic maps in combination with different transforms, like the Wavelet Transform (WT), Discrete Cosine Transform (DCT) and Lifting Wavelet Transform (LWT) are often used. Due to higher efficiency and fast processing, LWT is preferred over wavelet transform. In this paper, a novel partial image encryption scheme based on LWT, Secure Hash Algorithm (SHA-512), Logistic-sine chaotic map, TD-ERCS chaotic map and Substitution Box (S-Box) is presented. In comparison to other schemes, the proposed encryption technique is computationally efficient, secure and sensitive to initial key conditions

    DNA key based visual chaotic image encryption

    Get PDF
    With the exponential growth of Internet technologies, digital information exchanged over the Internet is also significantly increased. In order to ensure the security of multimedia contents over the open natured Internet, data should be encrypted. In this paper, the quantum chaotic map is utilized for random vectors generation. Initial conditions for the chaos map are computed from a DNA (Deoxyribonucleic acid) sequence along with plaintext image through Secure Hash Algorithm-512 (SHA-512). The first two random vectors break the correlation among pixels of the original plaintext image via row and column permutation, respectively. For the diffusion characteristics, the permuted image is bitwise XORed with a random matrix generated through the third random vectors. The diffused image is divided into Least Significant Bit (LSB) and Most Significant Bits (MSBs) and Discrete Wavelet Transform (DWT) is applied to the carrier image. The HL and HH blocks of the carrier image are replaced with LSBs and MSBs of the diffused image for the generation of a visually encrypted image. The detailed theoretical analysis and experimental simulation of the designed scheme show that the proposed encryption algorithm is highly secured. Efficiency and robustness of the proposed visually image encryption scheme is also verified via a number of attack analyses, i.e., sensitivity attack analysis (> 99%), differential attack analysis (NPCR > 99, UACI > 33), brute force attack (almost 7.9892), statistical attack (correlation coefficient values are almost 0 or less than zero), noise tolerance, and cropping attack. Further security analyses such as encryption quality (ID ≅ 1564, DH = 3.000), homogeneity (0.3798), contrast (10.4820) and energy (0.0144) of the scheme are also evaluated

    DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption

    Get PDF
    Visual selective image encryption can both improve the efficiency of the image encryption algorithm and reduce the frequency and severity of attacks against data. In this article, a new form of encryption is proposed based on keys derived from Deoxyribonucleic Acid (DNA) and plaintext image. The proposed scheme results in chaotic visual selective encryption of image data. In order to make and ensure that this new scheme is robust and secure against various kinds of attacks, the initial conditions of the chaotic maps utilized are generated from a random DNA sequence as well as plaintext image via an SHA-512 hash function. To increase the key space, three different single dimension chaotic maps are used. In the proposed scheme, these maps introduce diffusion in a plain image by selecting a block that have greater correlation and then it is bitwise XORed with the random matrix. The other two chaotic maps break the correlation among adjacent pixels via confusion (row and column shuffling). Once the ciphertext image has been divided into the respective units of Most Significant Bits (MSBs) and Least Significant Bit (LSBs), the host image is passed through lifting wavelet transformation, which replaces the low-frequency blocks of the host image (i.e., HL and HH) with the aforementioned MSBs and LSBs of ciphertext. This produces a final visual selective encrypted image and all security measures proves the robustness of the proposed scheme

    Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme

    Get PDF
    Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information. However, traditional watermarking schemes are either slow or less secure. In this paper, a dynamic S-Box based efficient watermarking scheme is presented. The original image was extracted at the receiver’s end without any loss of sensitive information. Firstly, the Secure Hash Algorithm is applied to the original image for the generation of the initial condition. Piece Wise Linear Chaotic Map is then used to generate 16 × 16 dynamic Substitution Box (S-Box). As an additional security feature, the watermark is substituted through dynamic S-Box. Hence, it is hard for the eavesdroppers to attack the proposed scheme due to the dynamic nature of S-Box. Lastly, lifting wavelet transform is applied to the host image and the High Low and High High blocks of host image are replaced with least significant bits and most significant bits of the substituted watermark, respectively. Robustness, efficiency and security of the proposed scheme is verified using Structure Similarity Index, Structure Dissimilarity Index, Structure Content, Mutual Information, energy, entropy, correlation tests and classical attacks analysis

    An Efficient Lightweight Image Encryption Scheme Using Multichaos

    Get PDF
    With an immense increase in Internet multimedia applications over the past few years, digital content such as digital images are stored and shared over global networks, the probability for information leakage and illegal modifications to the digital content is at high risk. These digital images are transferred using the network bandwidth; therefore, secure encryption schemes facilitate both information security and bandwidth issues. Hence, a state-of-the-art lightweight information security methodology is required to address this challenge. The main objective of this work is to develop a lightweight nonlinear mechanism for digital image security using chaos theory. The proposed scheme starts by changing a plain image into an encrypted image to improve its security. A block cipher, using lightweight chaos, has been added to achieve this objective for digital image security. We utilized multiple chaotic maps to generate random keys for each channel. Also, Arnold cat map and chaotic gingerbread map are used to add confusion and diffusion. During the permutation stage, image pixels are permuted, while in diffusion stage, pixels are distorted utilizing gingerbread map to add more security. The proposed scheme has been validated using different security parameter tests such as correlation coefficient tests (CC), whose results have been observed closer to zero and information entropy (IE) value is 7.99, respectively, which is almost equal to the ideal value of 8. Moreover, number of pixels changing rate (NPCR) obtained value is higher than 99.50%, while the unified average changing intensity (UACI) is 33.33. Other parameters such as mean absolute error (MAE), mean square error (MSE), lower value of peak to signal noise ratio (PSNR), structural content (SC), maximum difference (MD), average difference (AD), normalized cross-correlation (NCC), and histogram analysis (HA) is tested. The computed values of the proposed scheme are better. The achieved results after comparison with existing schemes highlight that the proposed scheme is highly secure, lightweight, and feasible for real-time communications

    Substantial and sustained reduction in under-5 mortality, diarrhea, and pneumonia in Oshikhandass, Pakistan : Evidence from two longitudinal cohort studies 15 years apart

    Get PDF
    Funding Information: Study 1 was funded through the Applied Diarrheal Disease Research Program at Harvard Institute for International Development with a grant from USAID (Project 936–5952, Cooperative Agreement # DPE-5952-A-00-5073-00), and the Aga Khan Health Service, Northern Areas and Chitral, Pakistan. Study 2 was funded by the Pakistan US S&T Cooperative Agreement between the Pakistan Higher Education Commission (HEC) (No.4–421/PAK-US/HEC/2010/955, grant to the Karakoram International University) and US National Academies of Science (Grant Number PGA-P211012 from NAS to the Fogarty International Center). The funding bodies had no role in the design of the study, data collection, analysis, interpretation, or writing of the manuscript. Publisher Copyright: © 2020 The Author(s).Peer reviewedPublisher PD
    corecore