Patient signals produced from a physical device, such as electrocardiography (ECG), which records the electrical activity of the heart, are vulnerable to keep noise due to various physical constraints of acquisition devices. It is critical for the detection and diagnosis of a variety of diseases. An ECG signal should be displayed as clean and clear as feasible due to its relevance in assisting physicians and doctors in making appropriate judgments. ECG is vulnerable to many types of noise because it is an electrical signal. To improve the quality of assistance for consumers Info a surveillance system by cooperative surveillance systems, high-quality data processing by the observed surveillance systems is required, which predetermines the requirement for high noise immunity of the latter. At the same time, the basics of building cooperative surveillance systems as a network of two-channel asynchronous information communication systems which include numeral of transmitting and receiving process using diverse frequency limits for reception and transmission, failure-prone open single-channel queuing systems, and request signals do not allow to provide the required the noise resistance of the systems under consideration. This paper first gives a characterization of request and interference signal flows in cooperative surveillance systems and briefly examines the features of request signals and their effect on the immunity of cooperative surveillance systems. Then, it calculates the noise resistance of the demand signals of the cooperative surveillance systems for the probabilities of errors: signal skipping; First- and second-degree false alarms in the case of unrelated events, unintended and intra-system impulse interferences in the request channel
In cloud computing, resources are used to communicate instead of local servers or individual devices. However, sharing resources among several users is a difficult issue in cloud communication. Cryptography and steganography techniques are used for cloud storage to address data security challenges. This paper presents a novel method for securely encrypting image data for transmission and link exchange with a cloud storage service. There are two phases to accomplish the encryption process, the first phase encrypts the image file by XORing it with a random key that is generated by a new hybrid of the chaotic map. The second phase converts the encrypted image format to audio format to add another layer of security and improve secure image data transfer. The random key is generated using a hybrid chaotic map and has the benefit of having more than 10256 key spaces and the necessary level of security. Based on a statistical analysis of the encryption, the quality of the image is evaluated using several criteria, and the results demonstrate the algorithm's ability to accomplish resist encryption
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.