74 research outputs found

    Curriculum integration as treaty praxis.

    Get PDF
    The article discusses the significance of curriculum integration on the promotion of principles of the Treaty of Waitangi, an agreement signed in 1840 by the Maori and the Crown people in New Zealand. It explores the challenges linked with this curriculum theory design. It also highlights a case study which analyzes the impact of curriculum integration in education

    Field programmable gate array (FPGA) implementation of novel complex PN-code-generator- based data scrambler and descrambler

    Get PDF
    A novel technique for the generation of complex and lengthy code sequences using low- length linear feedback shift registers (LFSRs) for data scrambling and descrambling is proposed. The scheme has been implemented using VHSIC hardware description language (VHDL) approach which allows the reconfigurability of the proposed system such that the length of the generated sequences can be changed as per the security requirements. In the present design consideration the power consumption and chip area requirements are small and the operating speed is high compared to conventional discrete I.C. design, which is a pre-requisite for any system designer. The design has been synthesised on device EP2S15F484C3 of Straitx II FPGA family, using Quarts Altera version 8.1. The simulation results have been found satisfactory and are in conformity with the theoretical observations

    On the Realization of Non-Linear Pseudo-Noise Generator for various Signal Processing and Communication Applications

    Get PDF
    In digital communication systems and digital signal processing, the design of pseudo-noise (PN) sequences having good correlation properties has been one of the most important development steps. Its well-known application areas include spread spectrum communications, Multiuser Communications, Digital Signal Processing for reduction of power spectral density, mitigation of Multiple Access Interference (MAI) and improvement of signal to noise ratio (SNR) respectively. In this paper a performance of non- linear PN code generator for interference rejection improvement of signal to noise ratio in signal processing applications have been studied.  The signal of interest can be considered to be a digitally controlled wide band digital chaotic signal, which has been implemented by conventional PN code generators.  The proposed technique can be used as an alternative code for improvement in signal to noise ratio, interference rejection, spreading code for various signal processing and communication applications.  The proposed scheme has been implemented using matlab as a simulation tool.  Power spectral density, auto-correlation and cross-correlation property have been thoroughly studied and has been compared with conventional scheme and are presented in the paper. Keywords: PN Code Generator, Spread Spectrum Modulation, Auto-correlation, Cross-correlation, Power Spectral Density

    High Capacity Data Embedding using joint Intermediate Significant Bit (ISB) and Least Significant Bit (LSB) Technique

    Get PDF
    The success of the Internet, coupled with availability of relatively inexpensive digital devices has created an environment in which it has become very easy to obtain, replicate and distribute digital content without any loss in quality. In such a scenario, data hiding has received significant attention from the research community round the globe, as it has been found useful in various areas like copyright protection, copy control, fingerprinting, content authentication and information security. Least Significant Bit based data hiding techniques have been used as effective means to hide the data to be secured, but they are less robust in nature. This paper presents a high capacity data hiding technique in which the data to be secured is embedded in Intermediate Significant Bits in addition to Least Significant Bits of cover image. The data to be embedded is broken down in data blocks of variable length and each block is embedded in the cover media in such a way that highest length data vector is embedded in lower order bit plane and vice-versa. This work shows attractive results with respect to imperceptibility and capacity when compared with a few reported techniques. Key Words: Intermediate Significant Bit, Embedding, Imperceptibility, Least Significant Bit.

    Data Hiding in Color Images: A High Capacity Data Hiding Technique for Covert Communication

    Get PDF
    A high capacity data hiding technique using color images as cover medium and referred to as 4R-4G-4B technique has been investigated and presented in this paper. The color image is firstly divided into its constituent bit planes followed by data embedding. To thwart the adversary different embedding algorithms have been used for embedding data in Red, Green and Blue planes. Additional layer of security to the embedded data is added by embedding secret data at the pseudorandom locations determined by Main Address Vector (MAV) and Complementary Address Vector (CAV). The comparison of our method with an existing technique shows that proposed technique is capable of providing better quality stego-images even if the embedded data is slightly more. A 2.7dB increase in PSNR in case of proposed technique substantiates the argument

    Efficient Security and Authentication for Edge-Based Internet of Medical Things

    Get PDF
    Internet of Medical Things (IoMT)-driven smart health and emotional care is revolutionizing the healthcare industry by embracing several technologies related to multimodal physiological data collection, communication, intelligent automation, and efficient manufacturing. The authentication and secure exchange of electronic health records (EHRs), comprising of patient data collected using wearable sensors and laboratory investigations, is of paramount importance. In this article, we present a novel high payload and reversible EHR embedding framework to secure the patient information successfully and authenticate the received content. The proposed approach is based on novel left data mapping (LDM), pixel repetition method (PRM), RC4 encryption, and checksum computation. The input image of size MimesNM imes N is upscaled by using PRM that guarantees reversibility with lesser computational complexity. The binary secret data are encrypted using the RC4 encryption algorithm and then the encrypted data are grouped into 3-bit chunks and converted into decimal equivalents. Before embedding, these decimal digits are encoded by LDM. To embed the shifted data, the cover image is divided into 2imes22 imes 2 blocks and then in each block, two digits are embedded into the counter diagonal pixels. For tamper detection and localization, a checksum digit computed from the block is embedded into one of the main diagonal pixels. A fragile logo is embedded into the cover images in addition to EHR to facilitate early tamper detection. The average peak signal to noise ratio (PSNR) of the stego-images obtained is 41.95 dB for a very high embedding capacity of 2.25 bits per pixel. Furthermore, the embedding time is less than 0.2 s. Experimental results reveal that our approach outperforms many state-of-the-art techniques in terms of payload, imperceptibility, computational complexity, and capability to detect and localize tamper. All the attributes affirm that the proposed scheme is a potential candidate for providing better security and authentication solutions for IoMT-based smart health

    Urban greenery a pathway to environmental sustainability in sub Saharan Africa: a case of Northern Nigeria cities

    Get PDF
    The Northern Region of Nigeria, which is located south of Africa biggest desert - the Sahara, is highly vulnerable to adverse impacts of climate change for some reasons. This paper attempts to review the variance between urban greenery, urban development and the quest for environmental sustainability. A critical review of relevant materials related to the study was carried out. The quantitative nature of the study was backed empirically. Findings from the study reveal that physical development plans for some urban areas have been very ad-hoc and loosely defined. Allocation of open green spaces is not in harmony with the urban population and it mostly characterized by a low percentage. Abuja master plan, for instance, has the highest allocation of 32.87%, while allocation in other master plans fall below 30% with Suleja master plan counts 2.5% only. Outdated master plan and the lack of will power from urban authority in plan implementation has often resulted in the distortion, encroachment, and conversion of green areas to other land uses. Increase carbon emission and pollution especially from the transport sector has been marked by a decline in greenery. Therefore, reducing the sequestration capacity of the urban area, weak urban planning and harsh climatic condition could be regarded as critical challenges. This study suggests the strict adherent to sustainable urban planning that integrates physical development and environmental consideration to enhance greenery. The study also recommends the placement of urban greenery on the same platform with the urban grey infrastructure by urban stakeholders

    Digital watermarking : applicability for developing trust in medical imaging workflows state of the art review

    Get PDF
    Medical images can be intentionally or unintentionally manipulated both within the secure medical system environment and outside, as images are viewed, extracted and transmitted. Many organisations have invested heavily in Picture Archiving and Communication Systems (PACS), which are intended to facilitate data security. However, it is common for images, and records, to be extracted from these for a wide range of accepted practices, such as external second opinion, transmission to another care provider, patient data request, etc. Therefore, confirming trust within medical imaging workflows has become essential. Digital watermarking has been recognised as a promising approach for ensuring the authenticity and integrity of medical images. Authenticity refers to the ability to identify the information origin and prove that the data relates to the right patient. Integrity means the capacity to ensure that the information has not been altered without authorisation. This paper presents a survey of medical images watermarking and offers an evident scene for concerned researchers by analysing the robustness and limitations of various existing approaches. This includes studying the security levels of medical images within PACS system, clarifying the requirements of medical images watermarking and defining the purposes of watermarking approaches when applied to medical images
    corecore