Reversible data hiding (RDH) in images is a technique, by which the original cover can be losslessly recovered after the embedded message is extracted. This important technique is widely used in medical imagery, military imagery and law forensics, where no distortion of the original cover is allowed. Since first introduced, RDH has attracted considerable research […]
Analyzing the Wisconsin Breast Cancer (WDBC) Data Set
In classification problems, the main goal is to derive an accurate representative data model that can correctly classify new test data instances. The accuracy of the classification model can be affected by the presence of outliers in a data set and the inability to correctly classify data records near the boundary. Considering the first case […]
Nice security measurement attack mitigation and countermeasures
The methods for selecting the countermeasures for a given attack scenario. When vulnerabilities are discovered or some VMs are identified as suspicious, several countermeasures can be taken to restrict attackers’ capabilities and it’s important to differentiate between compromised and suspicious VMs. The countermeasure serves the purpose of 1) protecting the target VMs from being compromised; […]
Pricing model for cloud computing in waiting time distribution
Power dissipation and circuit delay in digital CMOS circuits can be accurately modeled by simple equations,even for complex microprocessor circuits. CMOS circuits have dynamic, static, and short-circuit power dissipation; however, the dominant component in a well-designed circuit is dynamic power consumption P. Cloud computing is quickly becoming an effective and efficient way of computing resources […]
Policy based management is a very effective method to protect sensitive information
Policy administration is the key to protecting or operating information systems. Only after a legitimate policy set is designed, can the systems run correctly. This paper proposes a policy mechanism CPA under the current trust model, where a professional policy administrator or group is absent. Recently, the security of the Android platform becomes a hotspot […]
Security Model in Data Storage Systems
Cloud Computing is related to identity based secure distributed data storage (IBSDDS) schemes. CLOUD computing provides users with a convenient mechanism to manage their personal files with the notion called database-as-a-service (DAS. In DAS schemes, a user can outsource his encrypted files to untrusted proxy servers. Proxy servers can perform some functions on the outsourced […]
PACKET-BY-PACKET ADAPTIVE ROUTING AND SCHEDULING ALGORITHM FOR NETWORKS
They present our adaptive routing and scheduling algorithm. Packet-by-Packet Adaptive Routing for Networks—PARN for ease for repeated reference later. A introduce the queue structure that is used in PARN. The back-pressure algorithm introduced in has been widely studied in the literature. While the ideas behind scheduling using the weights suggested in that paper have been […]
Group key management (GKM) in mobile communication
The most important concerns is how to minimize the communication overhead when the shared GK is updated among the subscribers. Treebased KM, one class of GKM, has received considerable attention from many researchers since the amount of overhead for group rekeying is proportional to the logarithm of the group size. Many researchers have proposed new […]
HIGEN MINER Algorithm Pseudocode
Frequent itemset mining has been first proposed in, in the context of market basket analysis, as the first step of the association rule extraction process. The problem of discovering relevant changes in the history of itemsets and association rules has been already addressed by a number of research papers ,Active data mining was the first […]
Mobile users to collect the network-wide data
We consider the problem of ubiquitous data collection by the mobile user in a wireless sensor network. The mobile user uses a handheld device to communicate with sensor nodes in the network. The mobile user roams within the network and instantly accesses network-wide data on a need basis. For instance, in the aforementioned GreenOrbs project, […]
- « Previous Page
- 1
- …
- 44
- 45
- 46
- 47
- 48
- …
- 108
- Next Page »