ATOM: Efficient Tracking, Monitoring, and Orchestration of Cloud Resources Abstract– The emergence of Infrastructure as a Service framework brings new opportunities, which also accompanies with new challenges in auto scaling, resource allocation, and security. A fundamental challenge underpinning these problems is the continuous tracking and monitoring of resource usage in the system. In addition to…
Attribute Couplet Attacks and Privacy Preservation in Social Networks Abstract-The emerging of social networks, e.g., Facebook, Twitter, Instagram has eventually changed the way in which we live. Social networks are acquiring and storing a significant amount of profile information and daily activities of over billions of active users. The datasets, drawn from the social networks,…
Attribute-based Access Control for ICN Naming Scheme Abstract? Information Centric Networking (ICN) is a new network architecture that aims to overcome the weakness of existing IPbased networking architecture. Instead of establishing a connection between the communicating hosts, ICN focuses on the content, i.e. data, transmitted in network. Content copies in ICN can be cached at…
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing Abstract?Abstract Ciphertext-policy attribute-based encryption (CPABE) is a very promising encryption technique for secure data sharing in the context of cloud computing. Data owner is allowed to fully control the access policy associated with his data which to be shared. However, CP-ABE is limited to a potential security…
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Abstract-Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However,the standard ABE system does not support secure deduplication, which…
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Abstract– Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However, the standard ABE system does not support secure…
Automobile Spare Shop(Android App) Abstract-The electroencephalogram (EEG) signals are commonly used for diagnosis of epilepsy. In this paper, we present a new methodology for EEG based automated diagnosis of epilepsy. Our method involves detection of key-points at multiple scales in EEG signals using a pyramid of difference of Gaussian (DoG) filtered signals. Local binary patterns…
Automated Diagnosis of Glaucoma Using Empirical Wavelet Transform and Correntropy Features Extracted from Fundus Images Abstract– Glaucoma is an ocular disorder caused due to increased fluid pressure in the optic nerve. It damages the optic nerve subsequently causes loss of vision. The available scanning methods are Heidelberg Retinal Tomography (HRT), Scanning Laser Polarimetry (SLP) and…
Automated diagnosis of normal and alcoholic EEG signals Abstract? Electroencephalogram (EEG) signals, which record the electrical activity in the brain, are useful for assessing the mental state of a person. Since these signals are nonlinear and non-stationary in nature, it is very difficult to decipher the useful information from them using conventional statistical and frequency…
Automated Question Paper Generation System Abstract? In today?s age, education is the most important way of achieving success. When we discuss education, it is imperative to mention tests and examination. Examinations prepare students in their quest for knowledge. So, having a proper examination paper and format is quite necessary. Now the traditional method of generating…
Automatial Facial Age Estimation Abstract? Estimating human age from images is a problem that has recently gained attention from the computer vision community due to its numerous applications as well as the challenges that face a satisfactory solution. Beside traditional challenges in captured facial images under uncontrolled settings such as different lighting, varying poses and…
Automatic Artifact Rejection From Multichannel Scalp EEG by Wavelet ICA Abstract? Electroencephalographic (EEG) recordings are often contaminated by artifacts, i.e., signals with noncerebral origin that might mimic some cognitive or pathologic activity, this way affecting the clinical interpretation of traces. Artifact rejection is, thus, a key analysis for both visual inspection and digital processing of…