Image Encryption using Four-Dimensional Hyper Chaotic Lorenz System
The paper proposed the application of a new four-dimensional hyper chaotic map based on the Lorenz chaotic system to realize chaotic encryption for improved security. Hyper chaotic systems are more complex and difficult to predict. An image encryption algorithm is designed by utilizing the basic operations like permutation, confusion and diffusion. The combination of the user defined 256 bits secret key and the plain image are used as initial conditions for the 4D hyper-chaotic system to generate the key matrix. Several test images are used for inspecting the validity of the proposed work. The security analyses and computer simulations on the basis of key space analysis, statistical analysis, histogram analysis, information entropy analysis, correlation analysis and differential analysis is done. The NPCR and UACI values of encrypted images are also calculated. The result shows that a single bit change in the pixel value of the input plain images will cause a significant changed in the ciphered images. Total key space for the proposed method is 2256, which is good enough to protect the encrypted image against brute-force attack.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Imaging of the cerebral hydatid cyst in children: About 3 cases and literature review
Hydatid disease is a parasitic infestation that is a public health problem in many countries of traditional livestock breeding where it is endemic. Frequently encountered localizations are of hepatic and pulmonary sites, whereas cerebral localization is rare. CT is the test of choice for the diagnosis and postoperative follow-up of cerebral hydatid cyst. MRI is useful for atypical or complicated forms and allows for adequate surgical planning. We report three observations, two of which have an atypical appearance in imaging.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Impact of Purchasing and Supply Management Practices on Firm Performance Study of garment retailing in Pakistan
Purchasing and supply management practices play very important role for the performance of the firm, both are recognized as key success factor for an organization. The purpose of this study is to analyze the relationship of purchasing and supply management practices with firm performance. In this research data is collected from 440 respondents with the help of questionnaire. The modeling includes regression technique to analyze impact of purchasing and supply management practices on firm performance. On the basis of results of the study it was found that the strategic purchasing and supply management practices have significant impact on firm performance. Study was carefully conducted. But there were some limitations. Research was conducted by covering small population of retail garment sector as in Rawalpindi and Islamabad Pakistan; it would be good if it is completed by covering more cities.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Implementation of Advanced Network Intrusion Detection and Prevention System Using Rule Based Mining Techniques
This paper explores the detail implementation & experimental analysis of Advanced Network Intrusion Detection & Pretension System (ANIDPS). This advanced system mines anomalous traffic episodes from internet connection and reduced false positive rate by providing detection of 1. Known Intrusion using misuses or signature based Intrusion Detection System (IDS) by finding known intrusion or attack from existing intrusion signature database. 2. Unknown Intrusion using potentials of anomaly based Intrusion Detection System (IDS) If one of the intrusion detected mention above, system generate alert and apply the prevention policies to avoid further massive damaged to credentials, resources of the organization. Further this system generates new intrusion signature from Unknown Intrusion & store them back into signature database to speedup detection capability of this system in next computation. In this system the data mining approach is used to handle large amount of data captured in the internet, to improve its execution time & to give fast response to network administrator for prevention of data resource with minimum user interaction. In experimental analyses, this system gives improved & effective result in comparison with existing IDS & minimize the false positive rate
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Influence of Awareness and Technological Issues on the Sustenance of Institutional Repositories in Three State Universities in Nigeria
The focus of this research work was to investigate the influence of awareness and technological issues on the sustenance of institutional repositories (IRs) in three state universities in Nigeria. The study adopted a descriptive survey research design. The population was made up of librarians and lecturers from Ekiti State University, Ado-Ekiti, Adekunle Ajasin University Akungba Akoko, and Osun State University Osogbo. Data were collected using questionnaire designed to elicit response from respondents and analysed using descriptive statistics method of frequency counts and percentages. However, out of three hundred (300) copies of questionnaire administered to the respondents two hundred and forty three (243) were returned which represents 81% response rate for the study. Findings revealed that there is generally low level of awareness of the existence of institutional repositories among the respondents which could possibly inhibit its sustenance in the long run. In addition, technological challenges such as poor ICTs facilities and telecommunication infrastructure among other issues are factors militating against the sustenance of institutional repositories in Nigeria. However, the study concluded that university management and library stakeholders should mount awareness programmes and advocacy emphasising the benefits of IRs. It was recommended that for universities in Nigeria to keep pace with their counterparts across the globe, there is need to improve on the resources allocation to libraries by the university management to fast track IRs implementation and sustenance among other recommendations.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Influence of Awareness of Kenya Women Finance trust (KWFT) services on socio-economic empowerment of women entrepreneurs in Kenya
There has been a lot of mushrooming of SMEs, particularly in the rural parts of Kenya. The Small scale and medium enterprises (SMEs) contribute immensely to the women’s socio-economic empowerment and hence the growth of most of the world economies. To drive this affirmative action agenda, KWFT funds the SMEs inclined to women groups. However, the economic impact of this on women is still very low. Most women are still poorer than their men counterparts. It was therefore necessary to investigate the influence of awareness of KWFT services on socio-economic empowerment of women entrepreneurs in Kenya. The study objective was to examine the influence of the level of awareness of women on KWFT services on socio-economic empowerment of women entrepreneurs in Kenya. The outcome of the study would be significant since it would be a means to empower women entrepreneurs by enhancing awareness on Services rendered by KWFT. Questionnaires were used to collect data from 60 women entrepreneurs while interview schedule was used to obtain information from five KWFT staff. Simple random sampling was used to select the 60 women respondents and purposive sampling was used to select the five KWFT respondents. The result from the pilot study was used to validate the instruments and to enhance the appropriate reliability coefficient. Descriptive and inferential statistical analysis of quantitative data was done using correlation and multiple regressions. The findings were then presented in tables. The collected qualitative data were analyzed by content analysis into the themes (patterns) that emerged from the study. Pearson’s Product Moment Correlation was computed at p?0.05 level of significance to show the relationship between the variables. Results indicated that majority of the women entrepreneurs (97 percent) were members of registered self- help groups. The study findings revealed a high positive correlation (r =.96) between level of awareness of women entrepreneurs about KWFT services (r = .243) on socio-economic empowerment of women. All the two variables added statistically significant to the prediction, p < .05. The research study concluded that, women who were aware of the services of KWFT were more likely to utilize them for socio-economic empowerment.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Investigational study on discovery of face in versatile circumstances through Genetic and Ant Colony Optimization Algorithm
In this paper a novel face identification technique, ACOG algorithm has been proposed which is a hybrid of ACO (Ant Colony Optimization) algorithm and GA (Genetic algorithm). The ACO processes and extracts the features of the input image over which several pre-processing steps are done to enhance the chances of feature extraction. The extracted features are given as input to GA which detects the face features and compares the features with the existing face database.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
IoT Based Farmland Powered Using Solar Energy
In the present scenario, availability of power and water are insufficient to satisfy the farmer’s requirements. Traditionally implemented Techniques of irrigation are proving to be less futile as these are not good at multitasking different concerns which are combinations of availability of water, source of energy and timely soil profile analysis. With the merger of automation and the methods of irrigation used earlier. The scope to mitigate issues concerning water and power crisis, is huge. In this paper Internet of Things based solar powered smart irrigation system with monitoring and control features, is designed and implemented. The sensor enabled proposed model of smart irrigation system along with its Android application and ESP8266 as its main controllers. The farmland parameters can be monitored anywhere around the world with the help of IoT technology. The whole concept of this paper is implemented and then only the results are presented.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Kinetics, molecular dynamics and adsorption behaviour of pyridine on mild steel in 0.1 M HCl solution
The inhibition of the corrosion of mild steel in 0.1 M HCl solution by Pyridine from 303 K to 333 K at concentrations of 5 x 10-4 M, 1 x 10-4 M, 5 x 10-5, 2 x 10-5 M and 1 x 10-5 M was studied using gravimetric technique. The maximum inhibition efficiency 70 % at 5 x 10-4 M for 333 K was observed. The compound acted as corrosion inhibitors in 0.1 M HCl solution through adsorption on the mild steel surface. The maximum heat of adsorption (Q) was 1.0297 KJ/mol whereas the average kinetic energy (Ea) was 20.0 KJ/mol. The weight loss data treated kinetically gave a first order type of mechanism. The results elucidated the effects of inhibitor concentration, temperature, d? – P? interaction between the metal surface, the heteroatom of the inhibitor, and the electron charge densities on the heteroatoms of the Pyridine molecule. The adsorption of the inhibitor on the metal surface obeyed Temkin adsorption isotherm. Quantum chemical calculations using Hartree-fock density functional theory by Hamiltonian method was employed with PM3 (NDDO) basic set of minimal valence basis as STO3G Program.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Knowledge, attitudes and practices on HIV/AIDS of pupils in the terminal degree of secondary schools in the city of Kindu
Every year on December 1 the whole world celebrates World HIV/AIDS Day. This date reminds us that this disease still remains and is the basis of many cases of death. Based on this provision, the new Framework Law No. 14/004 of February 11, 2014 on national education on the organization and functioning of education in its article 9 in point 11 insists on the fight against endemic and epidemic diseases including HIV/AIDS, malaria and tuberculosis.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]