Showing 757–768 of 3871 results

  • Audit-Free Cloud Storage via Deniable Attribute-based Encryption

    Audit-Free Cloud Storage via Deniable Attribute-based Encryption

    0 out of 5
    4,500

    Audit-Free Cloud Storage via Deniable Attribute-based Encryption Abstract? Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been proposed to protect data from those who do not have access. All such schemes assumed that cloud storage providers are safe and cannot be hacked; however, in…

  • Authenticated Key Exchange Protocols for Parallel Network File Systems

    Authenticated Key Exchange Protocols for Parallel Network File Systems

    0 out of 5
    4,500

    Authenticated Key Exchange Protocols for Parallel Network File Systems Abstract? Authenticated Key Exchange Protocols for Parallel Network File Systems. We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of large-scale distributed ?le systems supporting parallel access to multiple storage devices. Our work focuses on the current…

  • Java Projects—Data Mining

    Authenticated Subgraph Similarity Search in Outsourced Graph Databases

    0 out of 5
    4,500

    Authenticated Subgraph Similarity Search in Outsourced Graph Databases Abstract?Subgraph similarity search is used in graph databases to retrieve graphs whose subgraphs are similar to a given query graph. It has been proven successful in a wide range of applications including bioinformatics and chem-informatics, etc. Due to the cost of providing efficient similarity search services on…

  • .NET Projects - Networking

    Authentication Using Captcha As Graphical Password

    0 out of 5
    4,500

    Authentication Using Captcha As Graphical Password Abstract?Authentication Using Captcha As Graphical Password. Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been under-explored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel…

  • Authentication for Session Password Using Color and Images

    Authentication for Session Password Using Color and Images

    0 out of 5
    4,500

    Authentication for Session Password Using Color and Images Abstract? Authentication for Session Password Using Color and Images. Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources until the…

  • Authorized Data Transfer using Key Classification

    Authorized Data Transfer using Key Classification

    0 out of 5
    3,500

    Authorized Data Transfer using Key Classification Abstract?Authorized Data Transfer using Key Classification. The goal of interaction between human and computer is to find a way to treat it like human-human interaction. Gestures play an important role in human’s daily life in order to transfer data and human emotions. The gestures are results of part of…

  • Auto emergency alert using android

    Auto emergency alert using android

    0 out of 5
    3,500

    Auto emergency alert using android Abstract?In the real world, patient has to be monitored by the person present in the home or by the helpers. There is no automatic alerting system being implemented so far. In this paper, the condition of the Patient is fully monitored with the help of Micro-Electro Mechanical System (MEMS), Heart…

  • Automated Diagnosis of Epilepsy using Keypoint Based Local Binary Pattern of EEG Signals

    Automated Diagnosis of Epilepsy using Keypoint Based Local Binary Pattern of EEG Signals

    0 out of 5
    4,500

    Automobile Spare Shop(Android App) Abstract-The electroencephalogram (EEG) signals are commonly used for diagnosis of epilepsy. In this paper, we present a new methodology for EEG based automated diagnosis of epilepsy. Our method involves detection of key-points at multiple scales in EEG signals using a pyramid of difference of Gaussian (DoG) filtered signals. Local binary patterns…

  • Automated Diagnosis of Glaucoma Using Empirical Wavelet Transform and Correntropy Features Extracted from Fundus Images

    Automated Diagnosis of Glaucoma Using Empirical Wavelet Transform and Correntropy Features Extracted from Fundus Images

    0 out of 5
    4,500

    Automated Diagnosis of Glaucoma Using Empirical Wavelet Transform and Correntropy Features Extracted from Fundus Images Abstract– Glaucoma is an ocular disorder caused due to increased fluid pressure in the optic nerve. It damages the optic nerve subsequently causes loss of vision. The available scanning methods are Heidelberg Retinal Tomography (HRT), Scanning Laser Polarimetry (SLP) and…

  • Automated diagnosis of normal and alcoholic EEG signals

    Automated diagnosis of normal and alcoholic EEG signals

    0 out of 5
    5,500

    Automated diagnosis of normal and alcoholic EEG signals Abstract? Electroencephalogram (EEG) signals, which record the electrical activity in the brain, are useful for assessing the mental state of a person. Since these signals are nonlinear and non-stationary in nature, it is very difficult to decipher the useful information from them using conventional statistical and frequency…

  • Matlab_Dip

    Automated Fiducial Localization in CT Images Based on Surface Processing and Geometrical Prior Knowledge for Radiotherapy Applications

    0 out of 5
    4,500

    Automated Fiducial Localization in CT Images Based on Surface Processing and Geometrical Prior Knowledge for Radiotherapy Applications   Abstract? We propose a novel method for radio-opaque external marker localization in CT scans for infrared (IR) patient set-up in radiotherapy. Efforts were focused on the quantification of uncertainties in marker localization in the CT dataset as…

  • Matlab_Dip

    AUTOMATED GLAUCOMA DETECTION USING HYBRID FEATURE EXTRACTION IN RETINAL FUNDUS IMAGES

    0 out of 5
    4,500

    AUTOMATED GLAUCOMA DETECTION USING HYBRID FEATURE EXTRACTION IN RETINAL FUNDUS IMAGES   Abstract?Glaucoma is one of the most common causes of blindness. Robust mass screening may help to extend the symptom-free life for affected patients. To realize mass screening requires a cost-effective glaucoma detection method which integrates well with digital medical and administrative processes. To…

End of content

End of content