Showing 61–72 of 125 results

  • Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme

    0 out of 5
    4,500

    Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme Abstract-With increasing popularity of cloud computing, the data owners outsource their sensitive data to cloud servers for flexibility and reduced cost in data management. To protect data privacy the sensitive data should be encrypted by the data owner before outsourcing which obsoletes data utilization like keyword-based document…

  • Enabling Technologies for the Internet of Health Things

    0 out of 5
    4,500

    Enabling Technologies for the Internet of Health Things Abstract-The Internet of Things (IoT) is one of the most promising technologies for the near future. Healthcare and well-being will receive great benefits with the evolution of this technology. This work presents a review of techniques based on IoT for healthcare and ambient assisted living, defined as…

  • Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services

    0 out of 5
    4,500

    Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services Abstract-Nowadays mobile devices such as smartphones have been widely used all over the world. In addition, the performance of image recognition has drastically increased with deep learning technologies. From these backgrounds, some photo-based information services provided in a client-server architecture are getting popular: client users…

  • Enhancement of voltage profile by incorporation of SVC in power system networks by using optimal load flow method in MATLAB/Simulink environments

    0 out of 5
    4,500

    Enhancement of voltage profile by incorporation of SVC in power system networks by using optimal load flow method in MATLAB/Simulink environments Abstract-Flexible AC Transmission Systems (FACTS) controllers could be a suitable alternative to provide reactive power support at the load centers locally and hence keep the voltages within their safe operating limits. Due to high…

  • ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning

    0 out of 5
    4,500

    ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning Abstract-Some trust-based methods have been proposed for consideration by guaranteeing the security routing of wireless sensor networks (WSN) recently. However, Most of the current research work usually consumes a lot of energy resources and computing resources or only performs well for specific…

  • Event Detection and Identification of Influential Spreaders in Social Media Data Streams

    0 out of 5
    4,500

    Event Detection and Identification of Influential Spreaders in Social Media Data Streams Abstract-Microblogging, a popular social media service platform, has become a new information channel for users to receive and exchange the most up-to-date information on current events. Consequently, it is a crucial platform for detecting newly emerging events and for identifying influential spreaders who…

  • Exam hall seat generation

    0 out of 5
    4,500

    Exam hall seat generation Abstract-This System provides facility to conduct Examination hall and duties schedule for the colleges. It saves time as it allows number of students to give the exam at a time and displays the exam schedule as the test gets over, so no need to wait for the queue. It is automatically…

  • Hotel Room Booking Management System

    0 out of 5
    4,500

    Hotel Room Booking Management System Abstract-The hotel industry is a business venture for the owner and a solace for the traveler and/or tourist. A customer can get stranded in the quest to secure a hotel room to pass the night if he has not made adequate plans by the existing system. Through this study, it…

  • Library management system

    0 out of 5
    4,500

    Library management system Abstract-The Library Management System is designed & developed for a receipt and issuance of books in the library along with the student?s details. The books received in the library are entered in Books Entry form and the new student is entered in the student entry form. When the student wants to get…

  • Low Power Address Generator for Memory Built-In Self Test

    0 out of 5
    4,500

    Low Power Address Generator for Memory Built-In Self Test Abstract-Memory is one of the basic computer components that is intensively accessed. Therefore, it is more likely to be affected by manufacturing faults rather than other components in the System on Chip (SoC). Memory Built-in Self Test (MBIST) is the most commonly used to test embedded…

  • Low-Power and Fast Full Adder by Exploring New XOR and XNOR Gates

    0 out of 5
    4,500

    Low-Power and Fast Full Adder by Exploring New XOR and XNOR Gates Abstract-In this paper, novel circuits for XOR/XNOR and simultaneous XOR?XNOR functions are proposed. The proposed circuits are highly optimized in terms of the power consumption and delay, which are due to low output capacitance and low short-circuit power dissipation. We also propose six…

  • Multi-Context Integrated Deep Neural Network Model for Next Location Prediction

    0 out of 5
    4,500

    Multi-Context Integrated Deep Neural Network Model for Next Location Prediction Abstract-The prediction of next location for users in location-based social networks has become an increasing significant requirement since it can benefit both users and business. However, existing methods lack an integrated analysis of sequence context, input contexts and user preferences in a unified way, and…

End of content

End of content