With the rapid developments in the remote sensing technologies and services, there is a necessity for combined compression and encryption of satellite imagery. The onboard satellite compression is used to minimize storage and communication bandwidth requirements of high data rate satellite applications. While encryption is employed to secure these resources and prevent illegal use of image sensitive information. In this paper, we propose an approach to address these challenges which raised in the highly dynamic satellite based networked environment. This approach combined compression algorithms (Huffman and SPIHT) and encryptions algorithms (RC4, blowfish and AES) into three complementary modes: (1) secure lossless compression, (2) secure lossy compression and (3) secure hybrid compression. The extensive experiments on the 126 satellite images dataset showed that our approach outperforms traditional and state of art approaches by saving approximately (53%) of computational resources. In addition, the interesting feature of this approach is these three options that mimic reality by imposing every time a different approach to deal with the problem of limited computing and communication resources.
This research article conveys the use of an agile approach for building an N-iterative HMM model for POST (Part of Speech Tagging) analysis. The agile model is a phenomenon or approach which has vast application. The implementation of such an iterative model is discussed in this paper. Most effectively, the information is conveyed with the help of the exact word we use during the communication. The sentence may not be a complete sentence or grammatically correct sentence, but the purpose of communication is served without any hurdle. Ages witnessing the evolution of the language earlier medium was sign language that might not contain any language communication rules that can be completed. Now complete language with so many tools and API is available, but the way preferred for the processing is the same (logically). The designed iterations lead to improved quality validation by using the word by word score calculation. The experiment is conducted to complete Part of Speech Tagging (POST) for Iraqi National Song (data set of translated Iraqi national song), and the stochastic approach used for completing the tagging is Iterative Hidden Markov Model. The results of the experiments convey the positive impact of the iterative approach over accuracy.
A finite state automaton is conceptual graphs which are considered to be an important type of graph method. As a result of the expansion of using the graphs in the process of data mining, the use of FMS is still limited because of the difficulty in processing databases, therefore this paper is to find an approach that make it easier to deal with large groups of machines as a database is encourage to use of this type of representation in mining techniques. This paper gives a approach for finding a match between machines, which appear frequently in a single environment or similar environments, the approach consist of two methods one for machines matching as adjacency matrices and another method for matching machines as vectors of features ,hence prove that second method more efficient to control the match processing
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.