Showing 205–216 of 247 results

  • Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords

    0 out of 5
    4,500

    Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords   Abstract?Photos with people (e.g., family, friends, celebrities, etc.) are the major interest of users. Thus, with the exponentially growing photos, large-scale content-based face image retrieval is an enabling technology for many emerging applications. In this work, we aim to utilize automatically detected human attributes that contain…

  • Scalable secure sharing Personal Health Record in cloud(JSP)

    0 out of 5
    4,500

    Scalable secure sharing Personal Health Record in cloud(JSP)   Abstract?Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is often outsourced to be stored in a third-party server. In this paper we propose a novel secure and scalable system for sharing PHRs. We focus…

  • Scalable secure sharing Personal Health Record using Attribute Based Encryption

    0 out of 5
    4,500

    Scalable secure sharing Personal Health Record using Attribute Based Encryption Abstract? Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those…

  • Scene Text Detection via Connected Component Clustering and Nontext Filtering

    0 out of 5
    4,500

    Scene Text Detection via Connected Component Clustering and Nontext Filtering Abstract? we present a new scene text detection algorithm based on two machine learning classifiers: one allows us to generate candidate word regions and the other filters out nontext ones. To be precise, we extract connected components (CCs) in images by using the maximally stable…

  • Screen capture utility

    0 out of 5
    4,500

    Screen capture utility   Abstract? Screen capture utility Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On Demand * Remote Connectivity *…

  • SECURE SOLUTION FOR MOBILE ACCESS TO PATIENT?S HEALTHCARE RECORDS

    0 out of 5
    3,500

    SECURE SOLUTION FOR MOBILE ACCESS TO PATIENT?S HEALTHCARE RECORDS Abstract?Mobile devices are today widely accepted and their capability to provide access to services independent of user time and location make them well suited for provision of healthcare services to both patients and healthcare personnel. However, mobile services are still not generally allowed to operate with…

  • Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption

    0 out of 5
    4,500

    Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption   Abstract? SThe provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with content-based…

  • Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis

    0 out of 5
    4,500

    Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis   Abstract?With the rapid development of reputation systems in various online social networks, manipulations against such systems are evolving quickly. In this paper, we propose scheme TATA, the abbreviation of joint Temporal And Trust Analysis, < Final Year Projects >which protects reputation systems from a…

  • Security and Privacy Enhancing in Multi cloud Architecture

    0 out of 5
    4,500

    Security and Privacy Enhancing in Multi cloud Architecture   Abstract? Security and Privacy Enhancing in Multi cloud Architecture Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…

  • Security challenges in vehicular Cloud

    0 out of 5
    4,500

    Security challenges in vehicular Cloud   Abstract? In a series of recent papers, Prof. Olariu and his co-workers have promoted the vision of vehicular clouds (VCs), a nontrivial extension, along several dimensions, of conventional cloud computing. In a VC, underutilized vehicular resources including computing power, storage, and Internet connectivity can be shared between drivers or…

  • Security system based on Viola Jones Detection

    0 out of 5
    4,500

    Security system based on Viola Jones Detection   Abstract? ris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the irisemployed in automated border crossings, nationalID systems,etc.< Final Year Projects >This paper illustrates techniquesto improve performance of iris recognition system based onstationary images using NI LabVIEW(Vision…

  • Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks

    0 out of 5
    4,500

    Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks Abstract?Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…

End of content

End of content