Objectives: To increase needed for exchanging digital photos electronically, due to alarming demand for multimedia applications, and because of the increasing use of images in electronic processes. Hence, the need for protection by unauthorized user is necessary. Method: This paper primarily is focusing on the necessary protection of these images using a specific analyzes algorithm: Advanced Encryption Standard (AES) with a full its description, which is known as an algorithm (Rijndael). Findings: It will be determined the address decryption, which is made up of different styles in all encryption and decryption steps in order to protect the valuable information. This algorithm will be implemented on MATLAB software programming. Application: The above results and analysis for this crypto system based on AES algorithm give a high performance. So we have reason to believe that use this method to encrypt the image will have a very good prospect in the future.
Abstract-Any company concerning with information technology considers Automated performance management processes as a key component of its operations as it enables the company get a clear long -term assessment about the performance of employees as well as operating units of the company. One technique that the company could use to evaluate the present performance of both employees and operating units is the utilization of KPI -based management information system. The current study seeks to provide a new model of information system efficiency based on key performance indicator and the extent to which such approach helps the company evaluate the performance within the company. In addition to recognize the requirements and criteria needed to establish an effective system of performance measurement , the axioms that may influence the designing of the Model KPIs and the approaches that We need to be contracted with a fixed set of key performance indicators in order to facilitate hiring.
Abstract-Proposed compression system architecture based on Lempel-Ziv algorithm with sliding window history buffer, this architecture may be realized on FPGA, and can provide input data streams from multiple sources and context switching. Base requirements to impression system and compression system architecture were proposed. Compression system architecture should provide quick reconstruction possibility for building another system with other technical characteristics and architecture features (like reconfigurable system architecture features) on given architecture base. Digital signal processing may comprise lined or non-lined procedures. Non-lined signal processing is strictly associated with no lined structure sympathy then can apply in this period, regularity, and patiotemporal fields.
With the growing demand for telecommunications services, the number of calls to telecommunications companies related to issues of using services, setting up and maintaining equipment, as well as resolving possible problems arising in the process of using services is also growing. From the point of view of system analysis, the problem is the mismatch between the existing and the required (target) state of the system for a given state of the environment at the moment in time. Based on this definition, we consider the problem of the subscriber of the cellular network a mismatch between the existing and the required state of the cellular network in this state of the environment at the moment in time. The state of the cellular network is characterized by the functioning of all devices, the proposed range of services. A short time for analyzing problem situations and making decisions, a large amount of information characterizing the current situation, the difficulty of solving poorly formalized and poorly structured tasks in the absence of complete and reliable information about the state of the cellular communication network and the functioning of its elements lead to a mismatch of human capabilities to effectively solve these problems. In this regard, the development and implementation of a precedent based neural network expert system for solving the problems of subscribers of a cellular communication network is an urgent scientific and technical task.
In computer networks, loss of data packets is inevitable, because of the buffer memory overflow of at least one of the nodes located on the path from the source to the receiver, including the latter. Such losses associated with overflows are hereinafter referred to as congestion of network nodes. There are many ways to prevent and eliminate overloads; these methods, in the majority, are based on the management of data flows. A special place is taken by the maintenance of packages, taking into account their priorities. The ideas of these solutions are quite simple for their implementation in the development of appropriate software and hardware for telecommunication devices. The article considers a number of original solutions to these problems at a level sufficient for the development of new generations of telecommunication devices and systems such as allowing interrupting transmission of the low-priority packet practically at any stage, then to transmit a high-priority packet and only then resume the interrupted transfer, moreover warning in time the data source about the threat of overloading one or several nodes along the route in the propagation of data packets.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.