Authentication of Data Storage Using Decentralized Access Control in Clouds
Full text
Figure
Related documents
Based on it, the essential technology - augmented reality is studied for unmanned fully mechanized longwall face automation production, through the virtual-real combination,
The instruments used in the study included the Hepatitis B Knowledge Questionnaire, Health Beliefs Regarding Hepatitis B Virus Infection Questionnaire, and Self-Efficacy
This paper deals with the performance analysis of different adders like Ripple Carry Adder, Carry Look Ahead Adder, Carry Select Adder, Carry Save Adder, Kogge Stone Adder and
Identity provider (IP): IP is defined in the claim definition. It possesses knowledge about the subject and transforms it in the form of claims. It will be able to
We present a machine-learning approach using freely available software for analysing imperfect reconstructions to be used in place of the more traditional thresholding based
The contribution to the work is using convolutional neural network as a classification method along with the local binary pattern for feature extraction to detect the
unit is represented by a dc voltage source, which is interfaced to the microgrid through a VSC, an inductive filter, and a step-up transformer (with the same power rating as the
Histopathological examination of hematoxylin and eosin stained soft tissue sections revealed an unen- capsulated tissue mass showed diffuse proliferation of neoplastic