A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud Abstract? A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database…
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud Abstract? Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data-intensive applications without infrastructure investment. Along the processing of such applications, a large volume of intermediate data sets will be generated,…
A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes Abstract– The development of the Internet of Things (IoT) has made extraordinary progress in recent years in both academic and industrial fields. There are quite a few smart home systems that have been developed by major companies to achieve home automation. However, the nature…
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services Abstract? A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. The number of mobile users has dramatically risen in recent years. In this paper, an ef?cient authentication scheme for distributed mobile cloud computing services is proposed. The proposed scheme provides security and convenience for…
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services Abstract? A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. In modern societies, the number of mobile users has dramatically risen in recent years. In this paper, an ef?cient authentication scheme for distributed mobile cloud computing services is proposed. The proposed scheme provides security…
A Privacy-Preserving Framework for Large-ScaleContent-Based Information Retrieval Abstract?We propose a privacy protection framework for large-scale content-based information retrieval. It offers two layers of protection. First, robust hash values are used as queries to prevent revealing original content or features. Second, the client can choose to omit certain bits in a hash value to further increase…
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability Abstract-Remote data integrity checking is a crucial technology in cloud computing. Recently, many works focus on providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both features with the help of a third-party auditor. In a…
A Proactive Workflow Model for Healthcare Operation and Management Abstract– Advances in real-time location systems have enabled us to collect massive amounts of fine-grained semantically rich location traces, which provide unparalleled opportunities for understanding human activities and generating useful knowledge. Explicitly, delivers intelligence for real-time decision making in various fields, such as workflow management. Indeed,…
A Probabilistic Approach for Color Correction in Image Mosaicking Applications Abstract?Image mosaicking applications require both geometrical and photometrical registrations between the images that compose the mosaic. This paper proposes a probabilistic color correction algorithm for correcting the photometrical disparities. First, the image to be color corrected is segmented into several regions using mean shift. Then,…
A Probabilistic Method for Image Enhancement With Simultaneous Illumination and Re?ectance Estimation Abstract?A Probabilistic Method for Image Enhancement With Simultaneous Illumination and Re?ectance Estimation. A new probabilistic method for image enhancement is presented based on a simultaneous estimation of illumination and re?ectance in the linear domain.We show that the linear domain model can better represent…
An IoT Based System for Remote Patient Monitoring Abstract? Inverter-based implementation of operationaltransconductance amplifiers is an attractive approach for lowvoltage realization of analog subsystems. However, the high sensitivity of inverterlike amplifiers? performance to process and temperature variations limit the achievable performance of the whole system across process and temperature corners. In this paper, a tuning…