Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
6 pages
1 file
The document is a practical guide to using the `tidyverse` library for data manipulation and visualization in R. It demonstrates various techniques for data wrangling, including filtering, aggregating, and reshaping data structures with tools like `dplyr` and `tidyr`. Emphasis is placed on clear examples with code snippets and outputs, showcasing the functionalities for transforming data frames, as well as statistical operations such as calculating means and correlations.
tibble is a modern re-imagining of the data frame, keeping what time has proven to be effective, and throwing out what it has not. Tibbles are data.frames that are lazy and surly: they do less and complain more forcing you to confront problems earlier, typically leading to cleaner, more expressive code.
Parallel program allows most efficient use of processors. The efficient processors utilization is the key to maximizing performance of computing systems. This research paper described the computations to be parallelized One Time Pad (OTP) in the form of a sequential program. To transform the sequential computations into a parallel program, the control and data dependencies have to be taken into consideration to ensure that the parallel program produces the same results as the sequential program for all possible input values. The main goal is usually to reduce the program execution time as much as possible by using multiple processors or cores.
Circuits and Systems, 2002 IEEE International …, 2002
The security of digital images attracts much attention recently, and many image encryption methods have been proposed. In IS-CAS2000, a new chaotic key-based algorithm (CKBA) for image encryption was proposed. This paper points out CKBA is very weak to the chosen/known-plaintext attack with only one plainimage, and its security to brute-force ciphertext-only attack is overestimated by the authors. That is to say, CKBA is not secure at all from cryptographic viewpoint. Some experiments are made to show the feasibility of the chosen/known-plaintext attack. We also discuss some remedies to the original scheme and their performance, and we find none of them can essentially improve the security of CKBA.
Background An understanding of the trends in tuberculosis incidence, prevalence, and mortality is crucial to tracking of the success of tuberculosis control programmes and identification of remaining challenges. We assessed trends in the fatal and non-fatal burden of tuberculosis over the past 25 years for 195 countries and territories. Methods We analysed 10 691 site-years of vital registration data, 768 site-years of verbal autopsy data, and 361 site-years of mortality surveillance data using the Cause of Death Ensemble model to estimate tuberculosis mortality rates. We analysed all available age-specific and sex-specific data sources, including annual case notifications, prevalence surveys, and estimated cause-specific mortality, to generate internally consistent estimates of incidence, prevalence, and mortality using DisMod-MR 2.1, a Bayesian meta-regression tool. We assessed how observed tuberculosis incidence, prevalence, and mortality differed from expected trends as predicted by the Socio-demographic Index (SDI), a composite indicator based on income per capita, average years of schooling, and total fertility rate. We also estimated tuberculosis mortality and disability-adjusted life-years attributable to the independent effects of risk factors including smoking, alcohol use, and diabetes. Findings Globally, in 2015, the number of tuberculosis incident cases (including new and relapse cases) was 10·2 million (95% uncertainty interval 9·2 million to 11·5 million), the number of prevalent cases was 10·1 million (9·2 million to 11·1 million), and the number of deaths was 1·3 million (1·1 million to 1·6 million). Among individuals who were HIV negative, the number of incident cases was 8·8 million (8·0 million to 9·9 million), the number of prevalent cases was 8·9 million (8·1 million to 9·7 million), and the number of deaths was 1·1 million (0·9 million to 1·4 million). Annualised rates of change from 2005 to 2015 showed a faster decline in mortality (−4·1% [−5·0 to −3·4]) than in incidence (−1·6% [−1·9 to −1·2]) and prevalence (−0·7% [−1·0 to −0·5]) among HIV-negative individuals. The SDI was inversely associated with HIV-negative mortality rates but did not show a clear gradient for incidence and prevalence. Most of Asia, eastern Europe, and sub-Saharan Africa had higher rates of HIV-negative tuberculosis burden than expected given their SDI. Alcohol use accounted for 11·4% (9·3–13·0) of global tuberculosis deaths among HIV-negative individuals in 2015, diabetes accounted for 10·6% (6·8–14·8), and smoking accounted for 7·8% (3·8–12·0). Interpretation Despite a concerted global effort to reduce the burden of tuberculosis, it still causes a large disease burden globally. Strengthening of health systems for early detection of tuberculosis and improvement of the quality of tuberculosis care, including prompt and accurate diagnosis, early initiation of treatment, and regular follow-up, are priorities. Countries with higher than expected tuberculosis rates for their level of sociodemographic development should investigate the reasons for lagging behind and take remedial action. Efforts to prevent smoking, alcohol use, and diabetes could also substantially reduce the burden of tuberculosis.
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen plain-images. Performance of the attack is verified by experimental results. In addition, some defects of MCKBA, including insensitivity with respect to changes of plain-image/secret key, are reported.
This paper re-evaluates the security of a chaotic image encryption algorithm called MCKBA/ HCKBA and finds that it can be broken efficiently with two known plain-images and the corresponding cipher-images. In addition, it is reported that a previously proposed breaking on MCKBA/HCKBA can be further improved by reducing the number of chosen plain-images from four to two. The two attacks are both based on the properties of solving a composite function involving the carry bit, which is composed of the modulo addition and the bitwise OR operations. Both rigorous theoretical analysis and detailed experimental results are provided.
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen plain-images. Performance of the attack is verified by experimental results. In addition, some defects of MCKBA, including insensitivity with respect to changes of plain-image/secret key, are reported.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.