A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing

T Wang, J Zhou, X Chen, G Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Recent years witness the development of cloud computing technology. With the explosive
growth of unstructured data, cloud storage technology gets more attention and better …

[PDF][PDF] Detection of Cyber anomaly Using Fuzzy Neural networks

P Padma, V Gopi, MK Kumar - Journal of Engineering Sciences, 2020 - researchgate.net
The fuzzy neural networks belong to the Hybrid structured family which perform several acts
in various contexts pf pattern classification which includes the detection of abnormal or …

[PDF][PDF] JOINT EMERGENCY DATA AND SERVICE EVACUATION IN CLOUD DATA CENTERS AGAINST EARLY WARNING DISASTER

A RACHEL, MD SALEEM, S NARASIMULU - ijesat.com
As crucial network infrastructures for data storage and service delivery for customers
worldwide, cloud data centers are greatly threatened by disasters that occur frequently …

[PDF][PDF] AN EFFICIENCT VIDEO WATERMARKING TECHNIQUESBASED ON REVERSIBLE APPROACH FOR AUTHENTICATION

KV LAKSHMI, K NAGU, G SUDHA - ijesat.com
Everyday very huge amount of data is embedded on digital media or distributed over the
internet. The data so distributed can easily be replicated without error, putting the rights of …

[PDF][PDF] A FRAMEWORK TO ESTIMATE THE NUTRITIONAL VALUE OF FOOD IN REAL TIME USING DEEP LEARNING TECHNIQUES

P REDDY, BS REDDY, BS REDDY, AT SRI - jespublication.mlsoft.in
There has been a rapid increase in dietary ailments during the last few decades, caused by
unhealthy food routine. Mobile-based dietary assessment systems that can record real-time …

[PDF][PDF] A Framework to Estimate the Nutritional Value of Food in Real Time Using Deep Learning Techniques

K Praveena, K Raju - researchgate.net
There has been a rapid increase in dietary ailments during the last few decades, caused by
unhealthy food routine. Mobile-based dietary assessment systems that can record real-time …

[PDF][PDF] Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics

B Shalini, S Prasad - researchgate.net
In cloud forensic investigations, user activity logs may provide a valuable information source;
hence maintaining the reliability and accuracy of these logs is vital. Instead of the …

[PDF][PDF] Reconstruction of Two-Band Signals in Periodical Samples

S Dadi - researchgate.net
The Shannon sampling theorem states the lowest sampling rate for the lowpass bandlimited
signals. But for multiband bandlimited signals, it is inefficient to apply the Shannon sampling …

[PDF][PDF] Method Focused on EMD Processing Signal Duffing Weak Signal Detection Oscillator

S Dadi - researchgate.net
This paper studies the basic principle of weak signal detection of Duffing oscillator, and
obtains the error rate curve of weak signal detection of Duffing oscillator. To further improve …

[引用][C] A Study on Privacy Preserving in Big Data Mining Using Fuzzy Logic Approach

MK Kumar, PK Kar - Turkish Journal of Computer and Mathematics …, 2020