Showing 2953–2964 of 3871 results

  • Matlab ProjectProstate Segmentation in MR Images

    Prostate Segmentation in MR Images Using Discriminant Boundary Features

    0 out of 5
    4,500

    Prostate Segmentation in MR Images Using Discriminant Boundary Features Abstract? Prostate (i.e., gland located between the bladder and the penis) segmentation in magnetic resonance image i.e., technique used to image the body using discriminant boundary features. The prostate in magnetic resonance image has become more in need for its assistance to analysis and surgical planning…

  • Protection of Big Data Privacy

    Protection of Big Data Privacy

    0 out of 5
    5,500

    Protection of Big Data Privacy Abstract? big data have become a hot research topic. The increasing amount of big data also increases the chance of breaching the privacy of individuals. Since big data require high computational power and large storage, distributed systems are used. As multiple parties are involved in these systems, the risk of…

  • Protection of Big Data Privacy

    Protection of Big Data Privacy

    0 out of 5
    5,500

    Protection of Big Data Privacy Abstract?In recent years, big data have become a hot research topic. The increasing amount of big data also increases the chance of breaching the privacy of individuals. Since big data require high computational power and large storage, distributed systems are used. As multiple parties are involved in these systems, the…

  • Protection of DFIG wind turbine using fuzzy logic control

    Protection of DFIG wind turbine using fuzzy logic control

    0 out of 5
    4,500

    Protection of DFIG wind turbine using fuzzy logic control Abstract-In the last 15 years, Double Fed Induction Generator (DFIG) had been widely used as a wind turbine generator, due its various advantages especially low generation cost so it becomes the most important and promising sources of renewable energy. This work focuses on studying of using…

  • Protocol functions description using android

    Protocol functions description using android

    0 out of 5
    3,500

    Protocol functions description using android Abstract? Protocol functions description using android. The delayed message authentication protocol (DeMA protocol) is a protocol that can be used in order to exchange authentic information between two entities by using a one-way chain (i.e. an array of elements generated by a one-way function) on each entity’s side. The use…

  • Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

    Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

    0 out of 5
    4,500

    Provable Multicopy Dynamic Data Possession in Cloud Computing Systems Abstract? Provable Multicopy Dynamic Data Possession in Cloud Computing Systems. Increasingly more and more organizations are opting for outsourcing data to remote cloud service provi-ders < Final Year Projects 2016 > CSPs. Customers can rent the CSPs storage infrastructure to store and retrieve almost unlimited amount…

  • Dotnet-Data MiningProvable Multicopy Dynamic Data Possession in Cloud Computing Systems

    Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

    0 out of 5
    4,500

    Provable Multicopy Dynamic Data Possession in Cloud Computing Systems Abstract? Provable Multicopy Dynamic Data Possession in Cloud Computing Systems. Increasingly more and more organizations are opting for outsourcing data to remote cloud service providers CSPs.< Final Year Project 2016 > Customers can rent the CSPs storage infrastructure to store and retrieve almost unlimited amount of…

  • Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model

    Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model

    0 out of 5
    4,500

    Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model Abstract– Authenticated Key Exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power and highly efficient networks like pervasive and mobile computing network…

  • Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Shar ing on the Cloud

    Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Shar ing on the Cloud

    0 out of 5
    4,500

    Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Shar ing on the Cloud Abstract– Online data sharing for increased productivity and efficiency is one of the primary requirements today for any organization. The advent of cloud computing has pushed the limits of sharing across geographical boundaries, and has enabled a multitude of…

  • Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud

    Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud

    0 out of 5
    4,500

    Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud Abstract-Online data sharing for increased productivity and efficiency is one of the primary requirements today for any organization. The advent of cloud computing has pushed the limits of sharing across geographical boundaries, and has enabled a multitude of users to…

  • PROVEST: Provenance-based Trust Model for Delay Tolerant Networks

    PROVEST: Provenance-based Trust Model for Delay Tolerant Networks

    0 out of 5
    5,500

    PROVEST: Provenance-based Trust Model for Delay Tolerant Networks Abstract? Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent disconnection or delay. This work proposes a provenance-based trust framework, namely PROVEST (PROVEnance-baSed Trust model) that aims to achieve accurate peer-to-peer trust assessment and maximize the…

  • PROVEST: Provenance-based Trust Model for Delay Tolerant Networks

    PROVEST: Provenance-based Trust Model for Delay Tolerant Networks

    0 out of 5
    5,500

    PROVEST: Provenance-based Trust Model for Delay Tolerant Networks Abstract? Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent disconnection or delay. This work proposes a provenance-based trust framework, namely PROVEST (PROVEnance-baSed Trust model) that aims to achieve accurate peer-to-peer trust assessment and maximize the…

End of content

End of content