International Journal of Information Security - A Network Intrusion Detection System is a network security technology for detecting intruder attacks. However, it produces a great amount of... 相似文献
To ensure confidentiality and efficient network bandwidth, digital data must be compressed and encrypted. In most communication systems, these two factors are critical for information processing. Image compression and encryption may result in lower restoration quality and performance. Secure-JPEG is an effort to create a compression and encryption technique for digital data. This approach is based on the JPEG compression standard, which is the most extensively used lossy compression scheme. It enhances the usual JPEG compression algorithm to encrypt data during compression. The Secure-JPEG approach encrypts the data while it is compressed, and it may be easily modified to offer near lossless compression. Lossless compression, on the other hand, has a lower compression ratio and is only useful in certain situations. The paper addresses the issue of insufficient security as a result of the usage of a simple random number generator that is not cryptographically safe. The enhanced security characteristics are provided via the Generalized Bernoulli Shift Map, which has a chaotic system with proven security. Several cryptographic tests are used to validate the algorithm's security, and the chaotic system's behavior is also examined.
Wireless Personal Communications - With the emergence of COVID-19, smart healthcare, the Internet of Medical Things, and big data-driven medical applications have become even more important. The... 相似文献
We consider ad hoc networks with multiple, mobile intruders. We investigate the placement of the intrusion detection modules for misuse-based detection strategy. Our goal is to maximize the detection rate subject to limited availability of communication and computational resources. We mathematically formulate this problem, and show that computing the optimal solution is NP-hard. Thereafter, we propose two approximation algorithms that approximate the optimal solution within a constant factor, and prove that they attain the best possible approximation ratios. The approximation algorithms though require recomputation every time the topology changes. Thereafter, we modify these algorithms to adapt seamlessly to topological changes. We obtain analytical expressions to quantify the resource consumption versus detection rate tradeoffs for different algorithms. Using analysis and simulation, we evaluate these algorithms, and identify the appropriate algorithms for different detection rate and resource consumption tradeoffs. 相似文献
Dairy byproduct proteins are considered natural functional additives having the ability to interact with the starch and gluten network in a dough system and thus behave as dough improvers. Native whey proteins have negative effect in bread making so whey protein concentrates modified to increase viscosity in solution (mWPC) might overcome undesirable weakening of the gluten network which usually occurs in frozen dough products during prolonged times in frozen storage. The objective of this research project was to determine the effect of mWPC on empirical and fundamental dynamic rheological properties of wheat flour dough. The results for empirical rheological studies showed that addition of mWPC had significant effects on mixographic parameters and also increased values of mixing time and peak height percentage. The results for the fundamental mechanical properties of the frozen dough revealed an increase in the values of G′ with the increase in the frequency, along with an upward trend with increasing temperature, but the highest values were obtained after cooling. Addition of mWPC in the dough treatments induced softening in the dough system, as shown by the decrease in the values of the viscoelastic moduli. Rheological and textural changes in the bakery products made from frozen dough could be imparted by the incorporation of modified whey protein concentrates as dough improvers. 相似文献
Plant‐based drugs have reached remarkable acceptability as therapeutic remedy for various diseases due to the adverse effects of contemporary medicines. This increasing popularity of herbal drugs leads to a growing herbal market for the development of plant‐based drugs, nutraceuticals, pharmaceuticals and cosmeceuticals. Herbal drug adulteration is a complex problem which currently has undeniable consequences on health and nutrition. Ambiguities in nomenclature, misidentification and resemblance of colour and texture of the crude herbal drugs are the major causes of adulteration. Three different species commercially marketed under the same trade name Halion are Lepidium apetalum, Asparagus officinalis, and Lepidium didymum. The genuine source of Halion is Lepidium apetalum, which is authenticated by using basic and advanced taxonomic techniques. Morphology, anatomy and palynology of the misidentified sources were done using light and scanning electron microscopic techniques for authentication. This study may help to set microscopic techniques as a tool to achieve quality and standardization of the genuine source of the herbal drug. Phytochemical analysis and biological screening is needed for the further establishment of authenticity and quality of herbal drugs. 相似文献
Future telecommunications networks will consist of integrated packet-switched (IP and/or ATM), circuit-switched (PSTN), and wireless networks. Service providers will offer a wide portfolio of innovative applications over these integrated networks. Doing so rapidly and efficiently requires open network APIs, with a key API being that for call control, as well as for coordination and transactions. The JAIN community is defining an API for Java call control and Java coordination and transactions. The JCC API defines the interface for applications to initiate and manipulate calls, while JCAT defines the facilities for applications to be invoked and return results before or during calls. Note that in this context a call refers to a multimedia, multiparty, multiprotocol communications session. The JCC/JCAT Edit Group of JAIN is in the process of defining the first version of the JCC/JCAT API specification, which is expected to be released in early 2000. This article describes the background of and motivation for the design of the JCC/JCAT API. We describe the AIN and JTAPI call models on which the JCC/JCAT API is based. We then describe the scope of JCC/JCAT and its relationship to other JAIN Edit Groups defining facilities for enabling service creation. Finally, we describe the requirements and example service drivers for JCC/JCAT, as well as the initial proposed design and structure for JCC and JCAT 相似文献