DefinePK

DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.

Creation of a mapping system to generate objects similar to bit-coins


Article Information

Title: Creation of a mapping system to generate objects similar to bit-coins

Authors: Arun Karthik, Ashwin Joseph, R. Sethuraman

Journal: ARPN Journal of Engineering and Applied Sciences

HEC Recognition History
Category From To
Y 2023-07-01 2024-09-30
Y 2022-07-01 2023-06-30
Y 2021-07-01 2022-06-30
X 2020-07-01 2021-06-30

Publisher: Khyber Medical College, Peshawar

Country: Pakistan

Year: 2016

Volume: 11

Issue: 15

Language: English

Categories

Abstract

The Usage and Conversion of Images into numerical values - similar to QR Bar Codes with the intention of creating a substantially complex character value that would initially percolate, depending on, predominantly heavy processing, in order to generate characters with the end results matching a particular user to user feed. The ability to, for example, in the typical social media spectrum, that is, currently present in our eco-system, would be an ideal way to illustrate how this might, make better sense. Suppose the image, or images, such as your profile picture, would be used for the metamorphosis of that particular image to correspond to your phone number, this in turn would create a secure and stable way to re-define one’s vulnerability assets on said mobile device - every time there’s a change, in a particular image. What would be true - is the notion that, other people, in general, have access or possess with reasonable certainty - the ability to see and view - both your picture and phone number, as it would generally be in the public domain when you call, or inside an application. Though, this drawback could be easily overcome, with the help of Service Providers who, would be the only ones that would with reasonable flexibility be able to utilize someone’s network - whether GSM, CDMA, etc. to provide access to confidentially secured and locked networks along with the image at hand.


Paper summary is not available for this article yet.

Loading PDF...

Loading Statistics...