A novel method is presented for producing energy-efficient images, i.e., images that consume less electrical energy on energy-adaptive displays, yet have the same, or very similar perceptual quality to their original images. The proposed method relies on the fact the energy consumption of pixels in modern energyadaptive displays like OLED displays are directly proportional to the luminance of the pixels. Hence, in this work to reduce the energy consumption of an image while at the same time preserving its perceptual quality, it is proposed to reduce the luminance of the pixels in the image by one just-noticeable-difference (JND) threshold. To determine the JND thresholds, a Feature Transform based just Noticeable Difference Threshold (FTJNDT) model is developed. In the proposed model, the JND thresholds of each block in the given image are elevated by two non-linear saliency modulation functions using the visual saliency of the block. The parameters of the saliency modulation functions and obtain feature value are estimated through an adaptive optimization framework, which utilizes a state-of-the-art saliency-based objective image quality assessment (IQA) method. To evaluate the proposed methods, a set of subjective experiments were conducted, and the real energy consumption of the produced energy-efficient images were measured by accurate power monitor equipment on an OLED display. The obtained experimental results demonstrated that, on average, the proposed method is able to reduce the energy consumption by about 4.31% while preserving the perceptual quality of the displayed images.
This work discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The work will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Availability of data in the cloud is beneficial for many applications but it poses risks by exposing data to applications which might already have security loopholes in them. Similarly, use of virtualizati cloud computing might risk data when a guest OS is run over a hypervisor without knowing the reliability of the guest OS which might have a security loophole in it. This task will also provide an insight on data security aspects for Data-in-Transit and Data The study is based on all the levels of SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service).Growth of cloud computing is mainly hampered due to these security concerns and challenges. Prope security arrangements are need to be placed before selecting the service provider for any cloud computing service and customers need to be very careful about understanding the risks of security breaches and challenges of using this new computing environment.The methodology implements on Cloud toolbox, which is configure in Net Beans outcome demonstrates that it gives improved execution contrasted with supplementary predictable security algorithm. Crypto operation time, key operation time and total execution are reduced by 2.72%, 7.91% and 4.63% significantly. @ IJTSRD | Available Online @ www.ijtsrd.com | Volume -2 | Issue -5 |
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.