Resource Allocation in Non-Orthogonal and Hybrid Multiple Access System with Proportional Rate Constraint Abstract– Non-orthogonal multiple access (NOMA) has attracted a lot of attention recently due to its superior spectral efficiency and could play a vital role in improving the capacity of future networks. In this paper, a resource allocation scheme is developed for a…
Rethinking Security in the Era of Cloud Computing Abstract– Cloud computing has emerged as a dominant platform for computing for the foreseeable future, resulting in an ongoing disruption to the way we build and deploy software. This disruption offers a rare opportunity to integrate new approaches to computer security. In this paper we outline a…
Reversible Data Hiding in Encrypted Images Based on Progressive Recovery Abstract? A method of reversible data hiding in encrypted images (RDH-EI) based on progressive recovery. Three parties are involved in the framework, including the content owner, the data-hider, and the recipient. The content owner encrypts the original image using a stream cipher algorithm and uploads…
Reversible Data Hiding in Encrypted Images Based on Progressive Recovery Abstract? A method of reversible data hiding in encrypted images (RDH-EI) based on progressive recovery. Three parties are involved in the framework, including the content owner, the data-hider, and the recipient. The content owner encrypts the original image using a stream cipher algorithm and uploads…
Reversible Data Hiding in Encrypted Images by Reversible Image Transformation Abstract? With the popularity of outsourcing data to the cloud, it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the same time. Under such demands, reversible data hiding in encrypted images (RDH-EI) attracts more…
Reversible Data Hiding in Encrypted Images by Reversible Image Transformation Abstract?Abstract With the popularity of outsourcing data to the cloud,it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the same time. Under such demands,reversible data hiding in encrypted images (RDH-EI) attracts more and more…
Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing Abstract– To be able to leverage big data to achieve enhanced strategic insight, process optimization and make informed decision, we need to be an efficient access control mechanism for ensuring end-to-end security of such information asset. Signcryption is one of several promising techniques to…
Rider Fatigue Detection and Speed Control Using Smart Helmet Abstract-Driver drowsiness is one of the major causes of Road accidents. The proposed system presents a helmet based nonintrusive Drowsiness recognition method using Brain wave signals with the help of EEG. Brain wave signals are continuously monitored to find the fatigue level of the rider by…
Risk Assessment in Social Networks based on User Anomalous Behaviours Abstract? Although the dramatic increase in OSN usage, there are still a lot of security and privacy concerns. In such a scenario, it would be very beneficial to have a mechanism able to assign a risk score to each OSN user. In this paper, we…
RoBA Multiplier: A Rounding-Based Approximate Multiplier for High-Speed yet Energy-Efficient Digital Signal Processing Abstract– An approximate multiplier that is high speed yet energy efficient. The approach is to round the operands to the nearest exponent of two. This way the computational intensive part of the multiplication is omitted improving speed and energy consumption at the…
Automobile Spare Shop(Android App) Abstract-This paper presents a new eHealth platform incorporating humanoid robots to support an emerging multidimensional care approach for the treatment of diabetes.The architecture of the platform extends the Internet of Things to a Web-centric paradigm through utilizing existing Web standards to access and control objects of the physical layer. This incorporates…
Robotic Disease Detection in Greenhouses: Combined Detection of Powdery Mildew and Tomato Spotted Wilt Virus Abstract? Robotic systems for disease detection in greenhouses are expected to improve disease control, increase yield, and reduce pesticide application. We present a robotic detection system for combined detection of two major threats of greenhouse bell peppers. < final year...