Showing 397–408 of 451 results

  • Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

    Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

    0 out of 5
    4,500

    Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control Abstract-With the rapid development of the Internet of Things (IoT) and cloud computing technologies, smart health (shealth) is expected to significantly improve the quality of health care. However, data security and user privacy concerns in shealth have not been adequately addressed. As a well-received…

  • Security and Privacy of Connected Vehicular Cloud Computing

    Security and Privacy of Connected Vehicular Cloud Computing

    0 out of 5
    4,500

    Security and Privacy of Connected Vehicular Cloud Computing Abstract-As vehicular equipment is becoming more and more intelligent, the vehicular information service, as the main means of capturing information, has been far from able to meet the needs of occupants [1, 2]. Cloud computing, with its powerful computing and storage capabilities, convenient network access, energy saving…

  • Security, Privacy, and Access Control in Information-Centric Networking: A Survey

    Security, Privacy, and Access Control in Information-Centric Networking: A Survey

    0 out of 5
    4,500

    Security, Privacy, and Access Control in Information-Centric Networking: A Survey Abstract-Information-Centric Networking (ICN) replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet and mobile ad hoc networks) with an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents? origin. Content and client security, provenance, and identity privacy are…

  • Semantic security against web application attacks

    Semantic security against web application attacks

    0 out of 5
    4,500

    Semantic security against web application attacks Abstract? Semantic security against web application attacks. Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. This paper focuses on internal timing attacks, a particularly dangerous class of timing attacks,…

  • Sensitivity Analysis on Locations of Energy Storage in Power Systems with Wind Integration

    Sensitivity Analysis on Locations of Energy Storage in Power Systems with Wind Integration

    0 out of 5
    5,500

    Sensitivity Analysis on Locations of Energy Storage in Power Systems with Wind Integration Abstract?Abstract The penetration of renewable energy sources, particularly wind energy, into power systems has been rapidly increasing in recent years. However, the integration of wind power has posed many challenges for power system operation.For instance, this type of energy source is relatively…

  • SentiHealth-Cancer: A sentiment analysis tool to help detecting moodof patients in online social networks

    SentiHealth-Cancer: A sentiment analysis tool to help detecting moodof patients in online social networks

    0 out of 5
    5,500

    SentiHealth-Cancer: A sentiment analysis tool to help detecting moodof patients in online social networks Abstract?Abstract Cancer is a critical disease that affects millions of people and families around the world. In2012 about 14.1 million new cases of cancer occurred globally. Because of many reasons like the severityof some cases, the side effects of some treatments…

  • Sharing of Patient confidential data using ECG steganography

    Sharing of Patient confidential data using ECG steganography

    0 out of 5
    4,500

    Sharing of Patient confidential data using ECG steganography Abstract?Sharing of Patient confidential data using ECG steganography. The number of aging population are growing significantly. In accordance with Health Insurance Portability and Accountability Act (HIPAA) the patient’s privacy and security is important in the protection of healthcare privacy. Point-Of-care (PoC) is an application used in hospitals…

  • Simple T wave metrics may better predict early  is schema as compared to ST segment

    Simple T wave metrics may better predict early is schema as compared to ST segment

    0 out of 5
    5,500

    Simple T wave metrics may better predict early is schema as compared to ST segment Abstract?Abstract Recently, security issues are obstructing the development and using of cloud computing services. Authentication plays an important role in the cloud security, and numerous concerns have been raised to prevent an unauthorized users to access the entities? resources (sender…

  • Simulation studies of inverted pendulum based on PID controllers

    Simulation studies of inverted pendulum based on PID controllers

    0 out of 5
    5,500

    Simulation Modelling Practice and Theory Abstract?Abstract The inverted pendulum problem is one of the most important problems in control theory and has been studied excessively in control literatures. When a control system have more than two PID controllers, the adjustment of PID parameters is not an easy problem. In this paper, PID controllers are applied…

  • Single Phase Bidirectional H6 Rectifier/Inverter

    Single Phase Bidirectional H6 Rectifier/Inverter

    0 out of 5
    4,500

    Single Phase Bidirectional H6 Rectifier/Inverter Abstract-Transformer-less photovoltaic (PV) inverters are more widely adopted due to high efficiency, low cost and light weight, etc. However, H5, HERIC, etc. transformer-less PV inverters do not have the bidirectional capability for solar energy storage system in the future. With topology derivation history reviewed from rectifier to inverter, the essence…

  • Single-Phase Inverter with Energy Buffer and DC-DC Conversion Circuits

    Single-Phase Inverter with Energy Buffer and DC-DC Conversion Circuits

    0 out of 5
    4,500

    Online Allocation of Virtual Machines in a Distributed Cloud Abstract– This paper proposes a new single-phase inverter topology and describes the control method for the proposed inverter. The inverter consists of an energy buffer circuit, a dc-dc conversion circuit and an H-bridge circuit. The energy buffer circuit and H-bridge circuit enable the proposed inverter to…

  • Single-phase Microgrid with Dual Photovoltaic Array for Efficient Power Balance based on Power Conditioning System

    Single-phase Microgrid with Dual Photovoltaic Array for Efficient Power Balance based on Power Conditioning System

    0 out of 5
    5,500

    Single-phase Microgrid with Dual Photovoltaic Array for Efficient Power Balance based on Power Conditioning System Abstract?Abstract This paper proposes a single-phase microgrid based on a power conditioning system with dual photovoltaic array and an energy storage. A grid-connected inverter and battery charger are adopted for energy conversion from the two arrays of different construction. The…

End of content

End of content