The research on privacy protection in cloud, intermediate dataset privacy preserving and Priva-cy-Preserving Data Publishing (PPDP). Currently, encryption is exploited by most existing research to ensure the data privacy in cloud . Although encryption works well for data privacy in these approaches, it is necessary to encrypt and decrypt datasets frequently in many applications. Encryption […]
Thyristor-controlled series compensator and unified Power-flow controller
Increased demand of bulk power transfer in the modern power network has led to an increased focus on transmission constraints and alleviation. Flexible ac transmission systems (FACTS) devices offer a versatile alternative to conventional reinforcement methods. Among them, the thyristor-controlled series compensator (TCSC) and unified power-flow controller (UPFC) are important FACTS devices, which are used […]
A Non-Parametric Patch Sampling Method
The proposed method is composed of two main and sequential operations. The first one is a non-parametric patch sampling method used to fill-in missing regions. Rather than filling in missing regions at the original resolution, the inpainting algorithm is applied on a coarse version of the input picture. There are several reasons for performing the […]
Processing the prediction queue and sending PRED ACK or raw data
Cloud computing offers its customers an economical and convenient pay-as-you-go service model, known also as usage-based pricing . Cloud customers1 pay only for the actual use of computing resources, storage, and bandwidth, according to their changing needs, utilizing the cloud’s scalable and elastic computational capabilities. In particular, data transfer costs (i.e., bandwidth) is an important […]
Scalable Video Coding Technique in Mobile Networks
In this paper, we discussed our proposal of an adaptive mobile video streaming and sharing framework, called AMES-Cloud, which efficiently stores videos in the clouds (VC), and utilizes cloud computing to construct private agent (subVC) for each mobile user to try to offer “non-terminating” video streaming adapting to the fluctuation of link quality based on […]
Nice security measurement attack mitigation and countermeasures
The methods for selecting the countermeasures for a given attack scenario. When vulnerabilities are discovered or some VMs are identified as suspicious, several countermeasures can be taken to restrict attackers’ capabilities and it’s important to differentiate between compromised and suspicious VMs. The countermeasure serves the purpose of 1) protecting the target VMs from being compromised; […]
Security Model in Data Storage Systems
Cloud Computing is related to identity based secure distributed data storage (IBSDDS) schemes. CLOUD computing provides users with a convenient mechanism to manage their personal files with the notion called database-as-a-service (DAS. In DAS schemes, a user can outsource his encrypted files to untrusted proxy servers. Proxy servers can perform some functions on the outsourced […]
HIGEN MINER Algorithm Pseudocode
Frequent itemset mining has been first proposed in, in the context of market basket analysis, as the first step of the association rule extraction process. The problem of discovering relevant changes in the history of itemsets and association rules has been already addressed by a number of research papers ,Active data mining was the first […]
SOCIAL NETWORK ANALYSIS BASED MOBILE NODE GROUPING
The sporadically deployed BSs/APs to the mobile nodes. To reduce the delay of packet delivery to a mobile node which is out of the transmission range of a BS (e.g., connectivity lost due to high mobility), a cooperative packet delivery scheme based on carry-and forward mechanism is used . For such applications, are provided through […]
Hyperparameter Learning—Beam Sampling for the iHCRF
Hidden conditional random fields (HCRFs) are discriminative models that learn the joint distribution of a class label and a sequence of latent variables conditioned on a given observation sequence, with dependencies among latent variables expressed by an undirected graph. HCRFs learn not only the hidden states that discriminate one class label from all the others, […]
- 1
- 2
- 3
- …
- 9
- Next Page »