Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2016
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 2, No. 2 ( 2016-05-01), p. 452-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 2, No. 2 ( 2016-05-01), p. 452-
    Abstract: Cloud computing is a novel paradigm that allows users to remotely access their data through web- based tools and applications. Later, the users do not have the ability to monitor or arrange their data. In this case, many security challenges have been raised. One of these challenges is data integrity. Contentiously, the user cannot access his data directly and he could not know whether his data is modified or not. Therefore, the cloud service provider should provide efficient ways for the user to ascertain whether the integrity of his data is protected or compromised. In this paper, we focus on the problem of ensuring the integrity of data stored in the cloud. Additionally, we propose a method which combines biometric and cryptography techniques in a cost-effective manner for data owners to gain trust in the cloud. We present efficient and secure integrity based on the iris feature extraction and digital signature.  Iris recognition has become a new, emergent approach to individual identification in the last decade. It is one of the most accurate identity verification systems. This technique gives the cloud user more confidence in detecting any block that has been changed. Additionally, our proposed scheme employs user’s iris features to secure and integrate data in a manner difficult for any internal or external unauthorized entity to take or compromise it. Iris recognition is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane. Extensive security and performance analysis show that our proposed scheme is highly efficient and provably secure.
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2016
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Science Publishing Corporation ; 2019
    In:  International Journal of Engineering & Technology Vol. 8, No. 4 ( 2019-11-05), p. 478-
    In: International Journal of Engineering & Technology, Science Publishing Corporation, Vol. 8, No. 4 ( 2019-11-05), p. 478-
    Abstract: The effective selection of protein features and the accurate method for predicting protein structural class (PSP) is an important aspect in protein folding, especially for low-similarity sequences. Many promising approaches are proposed to solve this problem, mostly via computational intelligence methods. One of the main aspect of the prediction is the extraction of an excellent representation of a protein sequence. An integrated vector of dimensions 71 was extracted using secondary and hydropathy information in this study Using newly developed strategies for categorizing proteins into their respective main structures classes, which are all-α, all-β, α/β, and α+β. Support Vector Machine (SVM) and Differential Evolution (DE) were combined using the wrapper method to select the top N features based on the level of their respective importance. The classification can be made more accurate by tuning the kernel parameters for the SVM in the training phase. In this study, the mean of the classification rate from using the SVM classifier was used to evaluate the selected subset of features. This study was tested using two low - similarity data sets (D640 and ASTRAL). A comparison between the proposed (SVM + DE) based on DE feature selection approach and (SVM+DE) based on grid search (a traditional method to search for parameters) forms the core of this work. The proposed SVM+DE model is competitive and highly reliable in terms of time and performance accuracy compared with other reported methods in literature.   
    Type of Medium: Online Resource
    ISSN: 2227-524X
    URL: Issue
    Language: Unknown
    Publisher: Science Publishing Corporation
    Publication Date: 2019
    detail.hit.zdb_id: 2661563-0
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    NeuroQuantology Journal ; 2021
    In:  Webology Vol. 18, No. 2 ( 2021-12-23), p. 972-981
    In: Webology, NeuroQuantology Journal, Vol. 18, No. 2 ( 2021-12-23), p. 972-981
    Abstract: Nowadays the use of mobile devices has increased dramatically as they have been integrated into different learning facilities. In this paper, the opinions of high school students and their teachers will be evaluated in order to get a better understanding of how mobile devices are used in the learning environment. A qualitative and quantitative method was used in this study. Multiple cases for the purpose of understanding the level of students' use of these devices in schools. Through the results of this study, it can be determined whether spending on textbooks and supplies is necessary compared to replacing it with technology. This model can be divided into five categories. (MLIS) mobile phone by developing a mobile learning model in Iraqi secondary schools (MLIS). This model can be divided into five categories, including mobile learning, drivers, process, community, and influencing factors. Each of the categories is related to each other, as well as related to planning and goals. However, both students and teachers believe that using mobile devices in an educational setting can help increase overall achievement, improve student motivation, and create a positive learning environment in schools. This study also helps enrich the existing literature on mobile technology in schools, where knowledge is lacking in the Iraqi educational system.
    Type of Medium: Online Resource
    ISSN: 1735-188X , 1735-188X
    URL: Issue
    Language: Unknown
    Publisher: NeuroQuantology Journal
    Publication Date: 2021
    detail.hit.zdb_id: 2174517-1
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Springer Science and Business Media LLC ; 2023
    In:  Journal of Real-Time Image Processing Vol. 20, No. 5 ( 2023-10)
    In: Journal of Real-Time Image Processing, Springer Science and Business Media LLC, Vol. 20, No. 5 ( 2023-10)
    Type of Medium: Online Resource
    ISSN: 1861-8200 , 1861-8219
    Language: English
    Publisher: Springer Science and Business Media LLC
    Publication Date: 2023
    detail.hit.zdb_id: 2280192-3
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Elsevier BV ; 2023
    In:  Materials Today: Proceedings Vol. 80 ( 2023), p. 2577-2583
    In: Materials Today: Proceedings, Elsevier BV, Vol. 80 ( 2023), p. 2577-2583
    Type of Medium: Online Resource
    ISSN: 2214-7853
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2023
    detail.hit.zdb_id: 2797693-2
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    University of Babylon ; 2018
    In:  JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences Vol. 26, No. 4 ( 2018-02-01), p. 18-26
    In: JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences, University of Babylon, Vol. 26, No. 4 ( 2018-02-01), p. 18-26
    Abstract: The current state of education is mostly electronic. Factors such as servers, storage space, and software are more prominent than ever before. Cloud Computing is defined as an Internet-based computing space that allows its users to share resources, software and information. In the context of Iraq, increased educational spending has not translated into improved learning environments. This work intends to increase the efficiency of education in Iraq through reviewing the characteristics associated with cloud computing providers, such as Microsoft, Google and Amazon, in the context of enhancing the advantages to students, teachers, and other stakeholders. The work will also try to determine approaches that offered rich and affordable services and tools through posing a suitable Cloud Computing Model for Iraqi Schools (CCIS). This particular model is made up of three major parts; preparation, implementation and monitoring, and evaluating and reviewing. The CCIS model combines public and private clouds in the provision of multiple services to the students and enables the formation of links outside of schools. Problems associated with security and data privacy are quite low and under control in this model, as they are defended beyond firewalls alongside remote services, scalability, low costs, efficiency, and functional plug and play options. This study will also decrease the challenges faced by the model internally and externally via constant appraisals and review.
    Type of Medium: Online Resource
    ISSN: 2312-8135 , 1992-0652
    Language: Unknown
    Publisher: University of Babylon
    Publication Date: 2018
    detail.hit.zdb_id: 2741989-7
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages