高射炮 发表于 2025-3-26 22:19:17
http://reply.papertrans.cn/83/8235/823418/823418_31.png流逝 发表于 2025-3-27 03:16:33
Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Featuresiae points, texture, ridges etc. Several line and texture extraction techniques for palmprint have been extensively studied. This paper presents an intra-modal authentication system based on texture information extracted from the palmprint using the 2D- Gabor and 2D-Log Gabor filters. An individual饰带 发表于 2025-3-27 05:41:12
A New Variant of Algebraic Attackuce the degree of the algebraic equations as much as possible in order to obtain a lower time complexity. This paper presents one such means of obtaining low degree equations using the decomposition of Boolean functions. This method overcomes the two major drawbacks of fast algebraic attack. We havePatrimony 发表于 2025-3-27 10:05:26
Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryptiond for categorizing the data based on the sensitivity level of the health records, since encrypting all the records using the same mechanism will not be fair and also paves the way for intruders to decrypt all the records if the algorithm is found. To achieve fine-grained and scalable data control fo烦扰 发表于 2025-3-27 13:49:49
Clustering Based Routing Strategies for Energy Management in Ad-Hoc Networksts provide comparative performance analysis of RE-CBRP, MC-CBRP, existing CBRP and Dynamic Source Routing (DSR) protocols. Results demonstrate that the network can be efficiently optimized with respect to energy using the RE-CBRP and MC-CBRP as compared to CBRP and DSR.ungainly 发表于 2025-3-27 19:53:43
http://reply.papertrans.cn/83/8235/823418/823418_36.pngIrrigate 发表于 2025-3-27 21:55:59
A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environmentmization genetic algorithm has been proposed which reduces the failure rate and makespan of workflow applications. It allocates those resources to workflow application which are reliable and cost of execution is under user budget. The performance of genetic algorithm has been compared with max-min a模范 发表于 2025-3-28 05:02:55
Autonomic SLA Management in Cloud Computing Serviceswill really help to limit the over provisioning of resources and thus leads to the optimum usage of resources. As a consolidation the proposed architecture may yield maximized Business Level Objectives (BLOs) to the cloud providers.绝缘 发表于 2025-3-28 08:11:53
A Novel Audio Watermark Embedding and Extraction Method Based on Compressive Sensing, Sinusoidal Codusing sinusoidal speech coding bases and compressive sensing measurement matrix. Experimental results show that proposed method provide exact recovery of watermark information and host signal under noisy attacks.文艺 发表于 2025-3-28 11:19:48
Cryptanalysis of Two Authentication Scheme for DRM Systeming biometric keys in which user and server can mutually authenticate each other. We analyze both the schemes and show that both the schemes fail to prove their claim of resistance to most common attacks. Fan et al.’s scheme has failed to resist known session specific temporary information attack an