Secure Deduplication of Encrypted Data in Cloud

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Introduction : Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud. Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials …

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Read More »

Social image tag refinement

Social image tag refinement : Tri-Clustered Tensor Completion for Social Aware Image Tag Refinement

Social image tag refinement : Tri-Clustered Tensor Completion for Social Aware Image Tag Refinement Introduction: Social image tag refinement, which aims to improve tag quality by automatically completing the missing tags and rectifying the noise-corrupted ones, is an essential component for social image search. Conventional approaches mainly focus on exploring the visual and tag information, …

Social image tag refinement : Tri-Clustered Tensor Completion for Social Aware Image Tag Refinement Read More »

Topic Rehotting Prediction : When to Make a Topic Popular Again? A Temporal Model for Topic Rehotting Prediction in Online Social Networks

Topic Rehotting Prediction in Online Social Networks Topic rehotting prediction is popular technique in social networks. It is really popular to detect hot topics, which can benefit many tasks including topic recommendations, the guidance of public opinions, and so on. However, in some cases, people may want to know when to re-hot a topic, i.e., …

Topic Rehotting Prediction : When to Make a Topic Popular Again? A Temporal Model for Topic Rehotting Prediction in Online Social Networks Read More »

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

Cross tenant access control model for cloud computing. Sharing of resources on the cloud can be achieved on a large scale since it is cost effective and location independent. Despite the hype surrounding cloud computing, organizations are still reluctant to deploy their businesses in the cloud computing environment due to concerns in secure resource sharing. In …

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification Read More »

The passenger flow counting research of subway video based on image processing

The passenger flow counting research of subway video based on image processing. In view of the traditional transportation passenger flow statistics methods are rough statistics on passenger flow, and it can’t get statistical data of passenger flow in a certain period of time immediately, so the passenger flow counting method of subway video based on …

The passenger flow counting research of subway video based on image processing Read More »

Study on Corona Activity Using an Image Processing Approach

Study of Corona Activity using an Image Processing Approach In the present work, behaviour of corona discharges on the polymeric insulating sample, generated from a multiple needle electrode in the presence of normal air and fog (mist) condition, is studied with the aid of an image processing technique. The development of streamers is closely monitored …

Study on Corona Activity Using an Image Processing Approach Read More »

Artificial intelligence in a routing protocol

Artificial intelligence in routing protocol : The inclusion of artificial intelligence (AI) in routing protocol can improve the performance of routing protocols. Including artificial intelligence in a routing protocol using Software Defined Networks (SDN) is one of the most interesting research topic that is currently being investigated. Nowadays the application of AI over routing protocols …

Artificial intelligence in a routing protocol Read More »

E-Android: A New Energy Profiling Tool for Smartphones

Energy Profiling Tool for Smartphones As the limited battery lifetime remains a major factor restricting the applicability of a smartphone, Energy Profiling Tool is trending area now, so significant research efforts have been devoted to understand the energy consumption in smartphones. Existing energy modelling methods can account energy drain in a fine-grained manner and provide …

E-Android: A New Energy Profiling Tool for Smartphones Read More »