12 research outputs found

    Chaos Image Encryption Methods: A Survey Study

    Get PDF
    With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques

    Climate, peace and security programming in the Arab States: Considerations for integrated programming in Jordan, Yemen, Iraq and Somalia

    Get PDF
    The link between climate change and peace and security is becoming increasingly evident as the world grapples with the consequences of a warming planet. Climate change exacerbates existing inequalities and conflicts, and acts as a catalyst for new ones, as competition for dwindling resources, such as water and land intensify. Rising sea levels and extreme weather events displace communities, straining host communities’ resources, leading to potential social unrest. Additionally, climate-induced food and water scarcity can speak conflict over access to these essential resources. Furthermore, climate change can amplify existing social and economic inequalities, which can contribute to instability and unrest. Understanding the climate, peace, and security linkages, and developing integrated policies and programmes across this nexus, is critical to ensuring global peace and security, and addressing humanitarian needs while supporting sustainable development. This brief - based on the outcomes of a stakeholder workshop held in Cairo in March 2023 - outlines several best practices and lessons learned for the design, implementation, and evaluation of integrated programming that builds resilience to both climate change and security risks

    Measuring public transport accessibility : A quantitative analysis of the bus network in Uppsala through the prism of accessibility and mobility

    No full text
    Taking accessibility into consideration is crucial when planning for public transport in a city. The bus network of the Swedish city Uppsala has undergone major changes since 2017, featuring a new circular bus line and several exchange points where commuters can change to regional and city buses easily. Measuring the accessibility and mobility of the residents of Uppsala will be the focus of this study, to detect underserviced areas and to measure the availability of buses throughout the week. Measuring accessibility and mobility were visualised primarily with the help of Geographic Information System [GIS] and data from General Transit Feed Specification [GTFS]. This is conducted through a quantitative method by comparing population data, ridership count and public transport data. The data is collected from GTFS, Region Uppsala and Uppsala University. In the results, the supply of buses in central Uppsala meets the demand of the commuters, and most importantly during peak hours. The exchange points are valuable for commuters to execute their journeys by having broader route alternatives to choose from. Nevertheless, the usage of bus stations is sufficient in most parts of Uppsala. However, there are certain areas in central Uppsala that are lacking accessibility to bus stations

    Measuring public transport accessibility : A quantitative analysis of the bus network in Uppsala through the prism of accessibility and mobility

    No full text
    Taking accessibility into consideration is crucial when planning for public transport in a city. The bus network of the Swedish city Uppsala has undergone major changes since 2017, featuring a new circular bus line and several exchange points where commuters can change to regional and city buses easily. Measuring the accessibility and mobility of the residents of Uppsala will be the focus of this study, to detect underserviced areas and to measure the availability of buses throughout the week. Measuring accessibility and mobility were visualised primarily with the help of Geographic Information System [GIS] and data from General Transit Feed Specification [GTFS]. This is conducted through a quantitative method by comparing population data, ridership count and public transport data. The data is collected from GTFS, Region Uppsala and Uppsala University. In the results, the supply of buses in central Uppsala meets the demand of the commuters, and most importantly during peak hours. The exchange points are valuable for commuters to execute their journeys by having broader route alternatives to choose from. Nevertheless, the usage of bus stations is sufficient in most parts of Uppsala. However, there are certain areas in central Uppsala that are lacking accessibility to bus stations

    null

    No full text
    nullThe president and supreme leader of Islamic Republic of Iran are among the most identifiable figures of the Iranian regime, and represent two institutions highly consequential for Iranian policy-making. This work is an investigation of the development and interaction of these institutions from the creation of the Islamic Republic in 1979, as well as a comparison of the presidential tenures since 1989. It focuses on substantial effects on Iranian policy which result from formal changes to the institutions as well as their roles in Iranian politics.An examination of events shows that interaction between the two institutions do not have a significant impact on Iranian policy, which is singularly determined by the supreme leader, who is the most powerful actor in the regime. The president does, however have the ability to shape the country's economic, civil and cultural development, but this is highly dependent on the acquiescence of the Supreme Leader. Competition between the two institutions, when it occurs, is representative of factional struggles to determine the regime's survival strategy, which dictates its orientation between preservation of the establishment's interests on one side and change and development on the other

    Improved Security of a Deep Learning-Based Steganography System with Imperceptibility Preservation

    Get PDF
    Since its inception, the steganography system (SS) has continuously evolved and is routinely used for concealing various sensitive data in an imperceptible manner. To attain high performance and a better hiding capacity of the traditional SS, it has become essential to integrate them with diverse modern algorithms, especially those related to artificial intelligence (AI) and deep learning (DL). Based on this fact, we proposed a DL-based SS (DLSS) to extract some significant features (like pixel locations, importance, and proximity to the imperceptibility) from the cover image using a neural network (NN) in a hierarchical form, thus selecting the candidate pixels for embedding afterwards. The pixel weight was expressed in terms of the position, imperceptibility, and its relationship with adjacent pixels to be a stego image. Performance evaluation revealed that the proposed DLSS achieved imperceptibility of 84 dB for images in training mode of a standard dataset

    A survey on various image deblurring methods

    No full text
    Image blur is one of the main types of degradation that reduces image quality. Image deblurring is an attempt to invert blurring process by using mathematical model to get best estimation of latent (sharp) image. Blurring can be modeled mathematically as a convolution process between two functions which are image and Point Spread Function (PSF). PSF can be classified into more than one type depending on the reason for blurring. Gaussian is the type of PSF this study will focus on, and an implementation of such PSF to compare different deblurring methods. Based on the availability of prior knowledge about the degradation kernel (PSF), the deblurring methods can be divided into two major categories which are non-blind deconvolution and blind-deconvolution. Peak Signal to Noise Ratio (PSNR) and Structural Similarity (SSIM) are the tools used to estimate the performance of these methods

    A Network Coding-Aware Directional Broadcast Routing Scheme for VANET

    No full text
    Recent technological advancements in wireless communications are fundamentally changing the manner by which devices communicates with one another. Modern wireless devices build networks on their own and aid each other in passing information to any device in the network. The aim of this research is to design and develop a robust routing protocol using network coding technique for Vehicular ad hoc networks (VANET). The purpose of the protocol is to disseminate vehicular traffic to the vehicles approaching the problem area, rather than those leaving the problem area. The designed protocol during the research will be more robust, reliable, and efficient with topology change. In this research, network coding and geographical routing models will be used to develop network coding based VANET routing protocol for alerting vehicles approaching the accident area and emergency message dissemination. The network coding model assumed will serve to increase throughput, in this sense reducing packet loss which will provide a robust broadcast routing protocol

    A Network Coding-Aware Directional Broadcast Routing Scheme for VANET

    Get PDF
    Recent technological advancements in wireless communications are fundamentally changing the manner by which devices communicates with one another. Modern wireless devices build networks on their own and aid each other in passing information to any device in the network. The aim of this research is to design and develop a robust routing protocol using network coding technique for Vehicular ad hoc networks (VANET). The purpose of the protocol is to disseminate vehicular traffic to the vehicles approaching the problem area, rather than those leaving the problem area. The designed protocol during the research will be more robust, reliable, and efficient with topology change. In this research, network coding and geographical routing models will be used to develop network coding based VANET routing protocol for alerting vehicles approaching the accident area and emergency message dissemination. The network coding model assumed will serve to increase throughput, in this sense reducing packet loss which will provide a robust broadcast routing protocol

    Thigh-length compression stockings and DVT after stroke

    Get PDF
    Controversy exists as to whether neoadjuvant chemotherapy improves survival in patients with invasive bladder cancer, despite randomised controlled trials of more than 3000 patients. We undertook a systematic review and meta-analysis to assess the effect of such treatment on survival in patients with this disease
    corecore