Artificial Intelligence-Based Student Learning Evaluation: A Concept Map-Based Approach for Analyzing a Student?s Understanding of a Topic Abstract?Artificial Intelligence-Based Student Learning Evaluation: A Concept Map-Based Approach for Analyzing a Student?s Understanding we describe a tool coined as artificial intelligence-based student learning evaluation tool (AISLE). The main purpose of this tool is to improve the use…
Artificial-Neural-Network-Based Phase-Locking Scheme for Active Power Filters Abstract?Artificial-Neural-Network-Based Phase-Locking Scheme for Active Power Filters. This paper presents a phase-locking control scheme based on artificial neural networks (ANNs) for active power filters (APFs). The proposed phase locking is achieved by estimating the fundamental supply frequency and by generating a phase-locking signal. The nonlinear-least-squares-based approach is modified…
ASIC and FPGA Implementation of the Gaussian Mixture Model Algorithm for Real-Time Segmentation of High Definition video Abstract-ASIC and FPGA Implementation of the Gaussian Mixture Model Algorithm for Real-Time Segmentation of High Definition video. Background identification is a common feature in many video processing systems. This paper proposes two hardware implementations of the OpenCV version…
Assistive Clothing Pattern Recognition for Visually Impaired People Abstract? Assistive Clothing Pattern Recognition for Visually Impaired People. Choosing clothes with complex patterns and colors is a challenging task for visually impaired people. Automatic clothing pattern recognition is also a challenging research problem due to rotation, scaling, illumination, and especially large intraclass pattern variations. We have…
Associate Cable tv operators usingandroid Abstract?With the rapid development of IPTV technologies, traditional cable TV operators are facing fierce competitions from telecom operators who are gradually adopting the IPTV technology step by step. On the other hand, < Final Year Projects > cable TV operators are also on the way to become triple-play service operators….
Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing Abstract?Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing. Attribute-based encryption (ABE) is an advanced encryption technology where the privacy of receivers is protected by a set of attributes. An encryptor can ensure that only the…
Attribute Based Secure Mailing In College Campus Abstract?Attribute Based Secure Mailing In College Campus. Stress and Anxiety negatively affect mental health and can lead a number of debilitating impacts to overall health and well being. In the recent past, adolescents are becoming increasingly afflicted with Stress and Anxiety. In this paper, we report our findings…
Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing Abstract? With the popularity of cloud computing, there have been increasing concerns about its security and privacy. Since the cloud computing environment is distributed and untrusted, data owners have to encrypt outsourced data to enforce confidentiality. Therefore, how to achieve practicable access control of encrypted data…
Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing Abstract? With the popularity of cloud computing, there have been increasing concerns about its security and privacy. Since the cloud computing environment is distributed and untrusted, data owners have to encrypt outsourced data to enforce confidentiality. Therefore, how to achieve practicable access control of encrypted data…
Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks Abstract? a novel Multi-message Ciphertext Policy Attribute-Based Encryption (MCP-ABE) technique, and employs the MCP-ABE to design an access control scheme for sharing scalable media based on data consumers’ attributes (e.g., age, nationality, or gender) rather than an explicit list of the consumers’ names. <…
Attribute-Based Encryption With Verifiable Outsourced Decryption Abstract? Attribute-Based Encryption With Verifiable Outsourced Decryption. Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes…
Audit-Free Cloud Storage via Deniable Attribute-based Encryption Abstract? Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been proposed to protect data from those who do not have access. All such schemes assumed that cloud storage providers are safe and cannot be hacked; however, in…