Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 10, Issue 3-42019
Publisher:
  • Inderscience Publishers
  • World Trade Center Bldg, 29, route de Pre-Bois, Case Postale 896
  • Geneva 15
  • Switzerland
ISSN:1751-648X
EISSN:1751-6498
Reflects downloads up to 14 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
An out-of-band mobile authenticating mechanism for controlling access to data outsourced in the mobile cloud environment

'Mobile Cloud Computing' (MCC), a cloud environment, formed by mobile users at the client-side and cloud servers at the back-end enables users to store and pervasively access a huge amount of data via different mobile devices in a distributive manner. ...

research-article
Parkinson's diagnosis using ant-lion optimisation algorithm

Parkinson's disease (PD) is a long term progressive disorder of the central nervous system that mainly affects the movement of the body. But there are several limitations in detecting PD at an early stage. In this paper, a binary variant of the recently ...

research-article
An improved chaotic-based African buffalo optimisation algorithm

Optimisation remains inevitable in any organisation as the need to maximise the limited resources persists. It justifies the seemingly endless research in this area. This study explores the effectiveness of chaos to mitigate false or premature convergence ...

research-article
Image integrity verification via reversible predictive hiding and elliptic curve Diffie-Hellman

This paper presents a medical image integrity verification algorithm which will be able to detect any changes made in the pixel value or the size of a medical image. At the same time, it also provides a secure way of transmitting images over the public ...

research-article
Bio-inspired algorithms for diagnosis of breast cancer

Most commonly found cancer among women is breast cancer. Roughly 12% of women grow breast cancer during their lifetime. It is the second prominent fatal cancer among women. Breast cancer diagnosis is necessary during its initial phase for the proper ...

research-article
A robust approach to detect video-based attacks to enhance security

Face authentication has become widespread on smart devices and in various applications these days. Real time detection of human faces in video surveillance systems is challenging due to variations in expression and background conditions. Thus, precise ...

research-article
Increased PSNR with improved DWT digital watermarking technique

Today, the world is moving towards a digital era in every walk of life. Every business, government and private sectors, and research organisation use the digital image, as a transfer mode for critical data. The images over the internet are not secure ...

research-article
Secure provenance-based communication using visual encryption

Explicit specification of the historical record of an instance or a data item is called data provenance. It has many applications in various fields with regards to its importance on capturing data flow mechanisms. However, on the other hand, there are ...

research-article
A survey on partitional clustering using single-objective metaheuristic approach

Clustering is one of the important functions of data mining, which is used to analyse a large amount of data. It groups these set of data according to some similarity property such that data within the cluster are similar to each other and data between ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.