<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="http://localhost:8080/xmlui/handle/123456789/6637" />
  <subtitle />
  <id>http://localhost:8080/xmlui/handle/123456789/6637</id>
  <updated>2026-04-21T05:54:19Z</updated>
  <dc:date>2026-04-21T05:54:19Z</dc:date>
  <entry>
    <title>A Novel Image Encryption Optimization Technique</title>
    <link rel="alternate" href="http://localhost:8080/xmlui/handle/123456789/6658" />
    <author>
      <name>Dr.Srividya R</name>
    </author>
    <id>http://localhost:8080/xmlui/handle/123456789/6658</id>
    <updated>2022-10-14T14:56:48Z</updated>
    <published>2021-06-01T00:00:00Z</published>
    <summary type="text">Title: A Novel Image Encryption Optimization Technique
Authors: Dr.Srividya R
Abstract: Abstract— Image file confidentiality is a difficult issue&#xD;
these days for a variety of reasons in a range of industries,&#xD;
including medical, defence, academia, and many more. A&#xD;
range of practical ways have been studied in recent years to&#xD;
safeguard image data, however owing to technological&#xD;
improvements, such existing solutions have significant limits&#xD;
in current systems. Several academics have investigated a&#xD;
number of methodologies and strategies for maintaining&#xD;
picture secrecy and shielding top-secret information from&#xD;
attackers while images are sent via communications&#xD;
infrastructure. In this paper, an unique picture encryption&#xD;
technique based on a chaotic map and DNA encoding is&#xD;
jointly used for image encryption in a more pragmatic&#xD;
approach, as necessary in today's world to safeguard private&#xD;
data. This approach was tried and confirmed on a personal&#xD;
laptop with a 64-bit operating system, Windows 10, with 16&#xD;
GB RAM and the MATLAB R2020a version loaded (Random&#xD;
Access Memory). The results of this suggested approach&#xD;
reflect the best NPCR (Number of Pixel Change Rate) and&#xD;
UACI (Unified Average Changed Intensity) scores for a&#xD;
variety of selected photos for testing. This method works with&#xD;
a variety of image formats and is in great demand in today's&#xD;
world for safeguarding sensitive data or information while&#xD;
being transmitted across a communications infrastructure.&#xD;
More research is needed in the future to identify practical&#xD;
answers, as current communication networks are quickly&#xD;
changing throughout the world owing to technology&#xD;
breakthroughs.</summary>
    <dc:date>2021-06-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>A Blockchain based Electronic Medical Health Records Framework using Smart Contracts</title>
    <link rel="alternate" href="http://localhost:8080/xmlui/handle/123456789/6657" />
    <author>
      <name>Vardhini B</name>
    </author>
    <author>
      <name>Shreyas N Dass</name>
    </author>
    <author>
      <name>Sahana R</name>
    </author>
    <id>http://localhost:8080/xmlui/handle/123456789/6657</id>
    <updated>2022-10-14T14:52:34Z</updated>
    <published>2021-06-01T00:00:00Z</published>
    <summary type="text">Title: A Blockchain based Electronic Medical Health Records Framework using Smart Contracts
Authors: Vardhini B; Shreyas N Dass; Sahana R
Abstract: The common issues in medical services within&#xD;
the country are mostly associated with doctors' referral process, &#xD;
data transfer between health institutions, and portals for&#xD;
patients to access their medical information. Specific issues&#xD;
arise, such as sharing health Records across institutes or&#xD;
hospitals, problems with misuse of data once shared, no security,&#xD;
etc. The Electronic Health Record (EHR) Framework on&#xD;
Blockchain addresses those issues, resulting from a&#xD;
collaboration of all stakeholders involved. This paper explores&#xD;
the likelihood of representing medical records to make sure data&#xD;
privacy, data accessibility, and data interoperability for the&#xD;
healthcare-specific scenario. Data privacy refers to affording&#xD;
protection to ensure data is available when needed and not used,&#xD;
imparted, accessed, altered, or deleted while being stored or&#xD;
retrieved, or transmitted. Data accessibility is the ability to&#xD;
access the data regardless of natural or artificial accidents,&#xD;
hardware, or others. Improving the accessibility of health data&#xD;
in the healthcare sector while ensuring privacy has been&#xD;
identified as a necessary capability that involves every&#xD;
individual and organization. Traditionally, healthcare&#xD;
interoperability has centered on sharing data between business&#xD;
institutions, such as various hospital systems. The emphasis has&#xD;
lately been on patient-driven information sharing, where the&#xD;
exchange of medical information is patient-mediated and&#xD;
patient-driven. We propose implementing a large-scale&#xD;
information infrastructure to access Smart Contracts sponsored&#xD;
by EHRs as information mediators. The decentralized nature of&#xD;
blockchain technology will aid in making the EHR accessible&#xD;
over a broader network. Using Blockchain will help make far-&#xD;
reaching changes in the healthcare industry by providing&#xD;
immutable, authentic, and accessible medical records, privacy,&#xD;
and faster payments.</summary>
    <dc:date>2021-06-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>An Open Source Distributed Virtualization for Enterprise Infrastructure using OVIRT</title>
    <link rel="alternate" href="http://localhost:8080/xmlui/handle/123456789/6656" />
    <author>
      <name>R.Chinnaiyan</name>
    </author>
    <author>
      <name>Preetika B</name>
    </author>
    <id>http://localhost:8080/xmlui/handle/123456789/6656</id>
    <updated>2022-10-14T14:34:50Z</updated>
    <published>2021-06-01T00:00:00Z</published>
    <summary type="text">Title: An Open Source Distributed Virtualization for Enterprise Infrastructure using OVIRT
Authors: R.Chinnaiyan; Preetika B
Abstract: Virtualization normally suggests the formation&#xD;
of a virtual machine that can virtualize the total of hardware&#xD;
resources, including memory, stockpiling, processors, and&#xD;
organization availability. The necessities referenced from&#xD;
Goldberg and Popek, are that there are three angles to&#xD;
satisfy the virtualization. A proportional domain ought to&#xD;
be given to run a program that appeared differently in&#xD;
relation to a local framework.If the program shows an&#xD;
undeniable lead under virtualization, it may not be&#xD;
recognized as a virtualized situation. An ensured control of&#xD;
virtualized assets ought to be given by virtualization.&#xD;
Having unlimited oversight of assets is essential to&#xD;
guarantee information and assets on each virtual condition&#xD;
from any risks or lead impedance in sharing physical assets.&#xD;
Performance deterioration is normally expected by&#xD;
virtualization, because of the additional assignment for&#xD;
virtualization, anyway satisfactory execution should be&#xD;
accomplished with programming or equipment uphold in&#xD;
taking care of advantaged directions. These points of&#xD;
interest guarantee successful virtualization. In the going&#xD;
with portion, hypervisors and their sorts are clarified with&#xD;
the application level of virtualization. Virtualized resources&#xD;
are additionally introduced in CPU, memory, and I/O&#xD;
exchange. In this paper, we are examining how&#xD;
virtualization happens utilizing the Ovirt motor which&#xD;
incorporates virtualization, the design of virtualization&#xD;
innovation, Virtual Machine just as Hypervisors. Further&#xD;
examining the strategy of virtualization, motivations to&#xD;
utilize virtualization, Importance of Virtualization in&#xD;
conclusion talk about Pros and Cons of Virtualization. This &#xD;
paper shows the significance of virtualization innovation &#xD;
that can streamline IT tasks just as permit IT associations&#xD;
to react quicker to changing business requests.</summary>
    <dc:date>2021-06-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>BlockchainAs a Service (BaaS) Framework for Government Funded Projects e-Tendering Process Administration and  Quality Assurance using Smart Contracts</title>
    <link rel="alternate" href="http://localhost:8080/xmlui/handle/123456789/6655" />
    <author>
      <name>Hari Pranav A</name>
    </author>
    <id>http://localhost:8080/xmlui/handle/123456789/6655</id>
    <updated>2022-10-14T14:22:48Z</updated>
    <published>2021-06-01T00:00:00Z</published>
    <summary type="text">Title: BlockchainAs a Service (BaaS) Framework for Government Funded Projects e-Tendering Process Administration and  Quality Assurance using Smart Contracts
Authors: Hari Pranav A
Abstract: Government funded projects require the use of&#xD;
bidding via tenders , this process is tedious and leads to &#xD;
corruption as there is very less transparency . This paper&#xD;
proposes a solution using Blockchain as a Service for&#xD;
easy and transparent administration of public projects&#xD;
which allows various stakeholders to scrutinize the entire&#xD;
process .</summary>
    <dc:date>2021-06-01T00:00:00Z</dc:date>
  </entry>
</feed>

