Abile Technologies is Leading software Training and Development company, We also train on IEEE projects, JAVA J2EE IEEE project Titles for CSE IT Students Coimbatore and Tamil Nadu
Digital certificates provide advanced instruments for confirming identities in electronic environments. The application of digital certificates has been gaining global acceptance both in public and private sectors. In fact, the government field has witnessed increasing adoption of cryptographic technologies to address identity management requirements in cyberspace. The purpose of this article is to provide an overview of various governmental scenarios on the usage and application of digital certificates in the United Arab Emirates. The UAE government integrated public key infrastructure (PKI) technology into its identity management infrastructure since 2003. The article also explores the UAE digital identity issuing authority's position regarding government-to-government transactions and the prospective role of digital certificates.
Many financial entities have been developing applications on cloud infrastructures for some time, but very few have actually started to transform their core systems. In this challenging journey, they should consider seriously the differences in the characteristics of the applications that will enable them to take advantage of these infrastructures.
To begin with, the new core systems must have high modularity, which can be defined in three dimensions: structural, operational and development. Traditional core systems do not have these modularity characteristics, being the main cause that has led to the current complexity and lack of maintainability of current systems.
The use of Hexagonal Architecture can clearly help to provide the necessary features for new core systems.
Key frame extraction is an essential technique in the computer vision field. The extracted key frames should brief the salient events with an excellent feasibility, great efficiency, and with a high-level of robustness. Thus, it is not an easy problem to solve because it is attributed to many visual features.
This paper intends to solve this problem by investigating the relationship between these features detection and the accuracy of key frames extraction techniques using TRIZ. An improved algorithm for key frame extraction was then proposed based on an accumulative optical flow with a self-adaptive threshold (AOF_ST) as recommended in TRIZ inventive principles. Several video shots including original and forgery videos with complex conditions are used to verify the experimental results. The comparison of our results with the-state-of-the-art algorithms results showed that the proposed extraction algorithm can accurately brief the videos and generated a meaningful compact count number of key frames. On top of that, our proposed algorithm achieves 124.4 and 31.4 for best and worst case in KTH dataset extracted key frames in terms of compression rate, while the-state-of-the-art algorithms achieved 8.90 in the best case.
Digital certificates provide advanced instruments for confirming identities in electronic environments. The application of digital certificates has been gaining global acceptance both in public and private sectors. In fact, the government field has witnessed increasing adoption of cryptographic technologies to address identity management requirements in cyberspace. The purpose of this article is to provide an overview of various governmental scenarios on the usage and application of digital certificates in the United Arab Emirates. The UAE government integrated public key infrastructure (PKI) technology into its identity management infrastructure since 2003. The article also explores the UAE digital identity issuing authority's position regarding government-to-government transactions and the prospective role of digital certificates.
Many financial entities have been developing applications on cloud infrastructures for some time, but very few have actually started to transform their core systems. In this challenging journey, they should consider seriously the differences in the characteristics of the applications that will enable them to take advantage of these infrastructures.
To begin with, the new core systems must have high modularity, which can be defined in three dimensions: structural, operational and development. Traditional core systems do not have these modularity characteristics, being the main cause that has led to the current complexity and lack of maintainability of current systems.
The use of Hexagonal Architecture can clearly help to provide the necessary features for new core systems.
Key frame extraction is an essential technique in the computer vision field. The extracted key frames should brief the salient events with an excellent feasibility, great efficiency, and with a high-level of robustness. Thus, it is not an easy problem to solve because it is attributed to many visual features.
This paper intends to solve this problem by investigating the relationship between these features detection and the accuracy of key frames extraction techniques using TRIZ. An improved algorithm for key frame extraction was then proposed based on an accumulative optical flow with a self-adaptive threshold (AOF_ST) as recommended in TRIZ inventive principles. Several video shots including original and forgery videos with complex conditions are used to verify the experimental results. The comparison of our results with the-state-of-the-art algorithms results showed that the proposed extraction algorithm can accurately brief the videos and generated a meaningful compact count number of key frames. On top of that, our proposed algorithm achieves 124.4 and 31.4 for best and worst case in KTH dataset extracted key frames in terms of compression rate, while the-state-of-the-art algorithms achieved 8.90 in the best case.
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
Presented at the Ethereum Engineering Group Meetup in Brisbane, Australia, on 13 Nov 2019. We report on research to use an Ethereum blockchain as an MFA and/or MPA device to secure command channels on IoT networks, even when the underlying network may be compromised.
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...YogeshIJTSRD
Cloud Analytics is another area in the IT field where different services like Software, Infrastructure, storage etc. are offered as services online. Users of cloud services are under constant fear of data loss, security threats, and availability issues. However, the major challenge in these methods is obtaining real time and unbiased datasets. Many datasets are internal and cannot be shared due to privacy issues or may lack certain statistical characteristics. As a result of this, researchers prefer to generate datasets for training and testing purposes in simulated or closed experimental environments which may lack comprehensiveness. Advances in sensor technology, the Internet of things IoT , social networking, wireless communications, and huge collection of data from years have all contributed to a new field of study Big Data is discussed in this paper. Through this analysis and investigation, we provide recommendations for the research public on future directions on providing data based decisions for cloud supported Big Data computing and analytic solutions. This paper concentrates upon the recent trends in Big Data storage and analysing, in the clouds, and also points out the security limitations. Rajan Ramvilas Saroj "Cloud Analytics: Ability to Design, Build, Secure, and Maintain Analytics Solutions on the Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43728.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/43728/cloud-analytics-ability-to-design-build-secure-and-maintain-analytics-solutions-on-the-cloud/rajan-ramvilas-saroj
Oltre l’intelligenza Artificiale: agire alla velocità del pensieroJürgen Ambrosi
In questo Webinar racconteremo come l’intelligenza cognitiva di IBM Watson si affianca alle Università e ai Centri di Ricerca per potenziare gli skill e le capacità di analisi e di comprensione dei dati e delle informazioni.
Dare risposte concrete a problemi che incidono sulla nostra vita e il nostro lavoro, accedere ad un livello di conoscenza superiore grazie a nuove capacità cognitive anche questo è il nuovo modo di IBM per aiutare le Università e la Ricerca.
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets
IoT–smart contracts in data trusted exchange supplied chain based on block ch...IJECEIAES
Internet of Things (IoT) assumes a critical part in the advancement of different fields. The IoT data trusted exchange in recent year extend of uses influence an awesome request and increasing scale. In such a platform, exchange the data sets that they require and specialist organization can search. However, the enough trust as the third-party mediators for data exchange in centralized infrastructure cannot provide. This paper proposes a blockchain for IoT data trusted exchange based on decentralized solution. In particular, the fundamental standards of blockchain in verify manner, individuals can communicate with each other without a confided in mediator intermediary. Blockchain enable us to have a distributed, digital ledger. IoT (Internet of Things) sensor devices (zigbee) utilizing blockchain technology to assert public availability of temperature records, tracking location shipment, humidity, preventing damage, data immutability. The sensor devices looking the temperature, location, damage of each parcel during the shipment to completely guarantee directions. In blockchain all data is got moved from one position to another, where a smart contract assesses against the product attributes. Ethereum blockchain and smart contracts atlast it gets through knowledge a design to be copied and presents its decentralized distributed digital ledger, auditable, transparent, features visually.
Does the Convergence of the Blockchain, the Internet of Things and Artificial...eraser Juan José Calderón
Does the Convergence of the Blockchain, the
Internet of Things and Artificial Intelligence Changing
Our Lives, Education and the Known World of the
Internet?! Some Changes and Perspectives for the
International Economy. Elena GURGU
, Maria ANDRONIE
, Mihai ANDRONIE
, Irina DIJMARESCU
1, 2, 3Spiru Haret University, 13 Ion Ghica, Bucharest, 030045, Romania,
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...IJNSA Journal
The Public Key Infrastructure(PKI) provides facilities for data encryption, digital signature and time stamping. It is a system where different authorities verify and authenticate the validity of each participant with the use of digital certificates. A Certificate Policy (CP) is a named set of rules and it indicates the applicability of a certificate in a Public Key Infrastructure. Sometimes two companies or organizations with different PKIs merge. Therefore it would be necessary that their PKIs are also able to merge. Sometimes, the unification of different PKIs is not possible because of the different certificate policies. This paper presents a method to compare and assess certificate policies during merger and acquisition of companies.
DESIGN AND ANALYSIS OF DKRINGA PROTOCOL FOR LOCATION PRIVACY IN TRUSTED ENVIR...ijsptm
Originally K-anonymity principle was first used in relational databases to tackle the problem of data anonymity. In earlier protection techniques K threshold is used as personalization factor for mobile users. In case, K users are not present around needy client mobile user, query can be delayed and thus it will not help to achieve the Quality of service parameter. Moreover, authors have adopted methodology that if K-1
additional travelling users or queries are not seen by needy users, dummies are populated in the environment to improve the quality of service. Earlier architectures shows poor usage of K-principle, cryptography and cloaking space, which leads to threat during communication, more communication cost,
more computation cost. We present here enhanced privacy model in a trustworthy third party privacy context that employs the notion of K-anonymity. In this work, enhanced algorithms are introduced, that guarantees a success of Location Based Services (LBS) query replies coming back to mobile client. Client sends the query to the anonymization server (AS), where this server cloaks the users with other at least K
users. Our novelty in the experiment is that we have introduced cryptography from client to AS, modified
earlier algorithms for Ring-Band approach, smart location updates and simulated the scaled experiment in populated cities environment. The AS add the dummies but creates ring-band cloaking area and sends it to LBS server. Cryptography adds some time however ring-band approach reduces communication overhead. We have studied the performance with variation of different parameters. The response from LBS comes to AS with Point of Interests (POIs) along the ring-band. After which AS filters for precise POIs and sends reply to mobile client. With ring-band approach we may also skip the AS and have client to LBS approach directly but without identity protection.
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
Presented at the Ethereum Engineering Group Meetup in Brisbane, Australia, on 13 Nov 2019. We report on research to use an Ethereum blockchain as an MFA and/or MPA device to secure command channels on IoT networks, even when the underlying network may be compromised.
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...YogeshIJTSRD
Cloud Analytics is another area in the IT field where different services like Software, Infrastructure, storage etc. are offered as services online. Users of cloud services are under constant fear of data loss, security threats, and availability issues. However, the major challenge in these methods is obtaining real time and unbiased datasets. Many datasets are internal and cannot be shared due to privacy issues or may lack certain statistical characteristics. As a result of this, researchers prefer to generate datasets for training and testing purposes in simulated or closed experimental environments which may lack comprehensiveness. Advances in sensor technology, the Internet of things IoT , social networking, wireless communications, and huge collection of data from years have all contributed to a new field of study Big Data is discussed in this paper. Through this analysis and investigation, we provide recommendations for the research public on future directions on providing data based decisions for cloud supported Big Data computing and analytic solutions. This paper concentrates upon the recent trends in Big Data storage and analysing, in the clouds, and also points out the security limitations. Rajan Ramvilas Saroj "Cloud Analytics: Ability to Design, Build, Secure, and Maintain Analytics Solutions on the Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43728.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/43728/cloud-analytics-ability-to-design-build-secure-and-maintain-analytics-solutions-on-the-cloud/rajan-ramvilas-saroj
Oltre l’intelligenza Artificiale: agire alla velocità del pensieroJürgen Ambrosi
In questo Webinar racconteremo come l’intelligenza cognitiva di IBM Watson si affianca alle Università e ai Centri di Ricerca per potenziare gli skill e le capacità di analisi e di comprensione dei dati e delle informazioni.
Dare risposte concrete a problemi che incidono sulla nostra vita e il nostro lavoro, accedere ad un livello di conoscenza superiore grazie a nuove capacità cognitive anche questo è il nuovo modo di IBM per aiutare le Università e la Ricerca.
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets
IoT–smart contracts in data trusted exchange supplied chain based on block ch...IJECEIAES
Internet of Things (IoT) assumes a critical part in the advancement of different fields. The IoT data trusted exchange in recent year extend of uses influence an awesome request and increasing scale. In such a platform, exchange the data sets that they require and specialist organization can search. However, the enough trust as the third-party mediators for data exchange in centralized infrastructure cannot provide. This paper proposes a blockchain for IoT data trusted exchange based on decentralized solution. In particular, the fundamental standards of blockchain in verify manner, individuals can communicate with each other without a confided in mediator intermediary. Blockchain enable us to have a distributed, digital ledger. IoT (Internet of Things) sensor devices (zigbee) utilizing blockchain technology to assert public availability of temperature records, tracking location shipment, humidity, preventing damage, data immutability. The sensor devices looking the temperature, location, damage of each parcel during the shipment to completely guarantee directions. In blockchain all data is got moved from one position to another, where a smart contract assesses against the product attributes. Ethereum blockchain and smart contracts atlast it gets through knowledge a design to be copied and presents its decentralized distributed digital ledger, auditable, transparent, features visually.
Does the Convergence of the Blockchain, the Internet of Things and Artificial...eraser Juan José Calderón
Does the Convergence of the Blockchain, the
Internet of Things and Artificial Intelligence Changing
Our Lives, Education and the Known World of the
Internet?! Some Changes and Perspectives for the
International Economy. Elena GURGU
, Maria ANDRONIE
, Mihai ANDRONIE
, Irina DIJMARESCU
1, 2, 3Spiru Haret University, 13 Ion Ghica, Bucharest, 030045, Romania,
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...IJNSA Journal
The Public Key Infrastructure(PKI) provides facilities for data encryption, digital signature and time stamping. It is a system where different authorities verify and authenticate the validity of each participant with the use of digital certificates. A Certificate Policy (CP) is a named set of rules and it indicates the applicability of a certificate in a Public Key Infrastructure. Sometimes two companies or organizations with different PKIs merge. Therefore it would be necessary that their PKIs are also able to merge. Sometimes, the unification of different PKIs is not possible because of the different certificate policies. This paper presents a method to compare and assess certificate policies during merger and acquisition of companies.
DESIGN AND ANALYSIS OF DKRINGA PROTOCOL FOR LOCATION PRIVACY IN TRUSTED ENVIR...ijsptm
Originally K-anonymity principle was first used in relational databases to tackle the problem of data anonymity. In earlier protection techniques K threshold is used as personalization factor for mobile users. In case, K users are not present around needy client mobile user, query can be delayed and thus it will not help to achieve the Quality of service parameter. Moreover, authors have adopted methodology that if K-1
additional travelling users or queries are not seen by needy users, dummies are populated in the environment to improve the quality of service. Earlier architectures shows poor usage of K-principle, cryptography and cloaking space, which leads to threat during communication, more communication cost,
more computation cost. We present here enhanced privacy model in a trustworthy third party privacy context that employs the notion of K-anonymity. In this work, enhanced algorithms are introduced, that guarantees a success of Location Based Services (LBS) query replies coming back to mobile client. Client sends the query to the anonymization server (AS), where this server cloaks the users with other at least K
users. Our novelty in the experiment is that we have introduced cryptography from client to AS, modified
earlier algorithms for Ring-Band approach, smart location updates and simulated the scaled experiment in populated cities environment. The AS add the dummies but creates ring-band cloaking area and sends it to LBS server. Cryptography adds some time however ring-band approach reduces communication overhead. We have studied the performance with variation of different parameters. The response from LBS comes to AS with Point of Interests (POIs) along the ring-band. After which AS filters for precise POIs and sends reply to mobile client. With ring-band approach we may also skip the AS and have client to LBS approach directly but without identity protection.
Our mobility to Poland for the Comenius Project "MURAL"tweety1962
Our school is one of the partners of the Comenius Project called "MURAL".
our teachers and students are travelling to 7 different countries to meet our partners, to work on the project against discrimination and prejudice.
this is our first mobility to Poland: Wonderful experience!
"Consider the possible cultural influences on a fashion designer / brand of your choice using issues discussed in class".
Présentation réalisée par Elodie MICHEL.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2. www.abiletechnologies.com Email: info@abiletechnologies.com Call: 9600 984984
1. A Network Coding Equivalent Content Distribution Scheme for Efficient
Peer-to-Peer Interactive VoD Streaming
2012
2. BGP Churn Evolution: A Perspective From the Core 2012
3. Design, Implementation, and Performance of a Load Balancer for SIP
Server Clusters
2012
4. Distributed Packet Buffers for High-Bandwidth Switches and Routers 2012
5. Efficient Error Estimating Coding: Feasibility and Applications 2012
6. Footprint: Detecting Sybil Attacks in Urban Vehicular Networks 2012
7. Insights on Media Streaming Progress Using Bit Torrent-Like Protocols for
On-Demand Streaming
2012
8. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring 2012
9. On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer
Networks
2012
10. Self Adaptive Contention Aware Routing Protocol for Intermittently
Connected Mobile Networks
2012
11. Optimal Source-Based Filtering of Malicious Traffic 2012
12. Packet-Hiding Methods for Preventing Selective Jamming Attacks 2012
13. Clustering with Multi viewpoint-Based Similarity Measure 2012
14. Efficient Fuzzy Type-Ahead Search in XML Data 2012
15. Optimizing Bloom Filter Settings in Peer-to-Peer Multi-keyword Searching 2012
16. Adding Temporal Constraints to XML Schema 2012
17. Slicing: A New Approach for Privacy Preserving Data Publishing 2012
18. Ranking model adaption for Domain Specific Search 2012
19. A Trapdoor Hash-Based Mechanism for Stream Authentication 2012
20. Cooperative Provable Data Possession for Integrity Verification in Multi-
Cloud Storage
2012
21. Double Guard: Detecting Intrusions in Multitier Web Applications 2012
22. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or
Cyborg?
2012
23. Enhancing Data Trustworthiness via Assured Digital Signing 2012
3. www.abiletechnologies.com Email: info@abiletechnologies.com Call: 9600 984984
24. A Blur-Robust Descriptor with Applications to Face Recognition 2012
25. Handwritten Chinese Text Recognition by Integrating Multiple Contexts 2012
26. An Online Learning Approach to Occlusion Boundary Detection 2012
27. Combining Head Pose and Eye Location Information for Gaze Estimation 2012
28. Probabilistic Exposure Fusion 2012
29. Human Identification Using Temporal Information Preserving Gait
Template
2012
30. Secure Overlay Cloud Storage with Access Control and Assured Deletion 2012
5. www.abiletechnologies.com Email: info@abiletechnologies.com Call: 9600 984984
1. Combining Tag and Value Similarity for Data Extraction and
Alignment
2012
2. Coupled Behavior Analysis with Applications 2012
3. Efficient and Effective Duplicate Detection in Hierarchical Data 2012
4. Efficient Extended Boolean Retrieval 2012
5. Organizing User Search Histories 2012
6. Publishing Search Logs—A Comparative Study of Privacy Guarantees 2012
7. Slicing: A new Approach for Privacy Preserving Data Publishing 2012
8. Robust Face-Name Graph Matching for Movie Character Identification 2012
9. Finding Cheap Routes in Profit-Driven Opportunistic Spectrum Access
Networks: A Truthful Mechanism Design Approach
2012
10. Online Adaptive Compression in Delay Sensitive Wireless Sensor
Networks
2012
11. Design and Implementation of TARF: A Trust-Aware Routing
Framework for WSNs
2012
12. Optimizing Bloom Filter Settings in Peer-to-Peer Multi-keyword
Searching
2012
13. Enabling Secure and Efficient Ranked Keyword Search over
Outsourced Cloud Data
2012
14. Enhancing Data Trustworthiness via Assured Digital Signing 2012
15. Persuasive Cued Click-Points: Design, Implementation, and
Evaluation of a Knowledge-Based Authentication Mechanism
2012
16. Revisiting Defenses against Large-Scale Online Password Guessing
Attacks
2012
17. Ample - An Adaptive Traffic engineering system based virtual
routing topologies
2012
18. Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and
Cross-Layer Optimization for Scalable Video Streaming
2012
19. A Trigger Identification Service for Defending Reactive Jammers in
WSN
2012
20. Converge Cast: On the Capacity and Delay Tradeoffs 2012
6. www.abiletechnologies.com Email: info@abiletechnologies.com Call: 9600 984984
21. Topology control in mobile ad hoc Networks with cooperative
communications
2012
22. Automatic Image Equalization and Contrast Enhancement Using
Gaussian Mixture Modeling
2012
23. Combining Head Pose and Eye Location Information for Gaze
Estimation
2012
24. Robust Face name graph matching for movie character identify 2012
25. Image Authentication Using Distributed Source Coding 2012
26. Analyzing Image Deblurring Through Three Paradigms 2012
27. Smile Detection by Boosting Pixel Differences 2012
28. An Online Learning Approach to Occlusion Boundary Detection 2012
29. A Secret-Sharing-Based Method for Authentication of Grayscale
Document Images via the Use of the PNG Image With a Data Repair
Capability
2012
30. Cashing in on the Cache in the Cloud 2012
31. Cooperative Provable Data Possession for Integrity Verification in
Multi-Cloud Storage
2012
32. pCloud: A Distributed System for Practical PIR 2012
33. SPOC: A Secure and Privacy-preserving Opportunistic Computing
Framework for Mobile-Healthcare Emergency
2012