Search Results - "Hashcode"

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Insider Attack Monitoring and Secured Data Transfer Using KPCC and BiO‐ELSTM in Cloud Computing by Yalla, Rama Krishna Mani Kanta, Mamidala, Vijaykumar, Yallamelli, Akhil Raj Gaius, Devarajan, Mohanarangan Veerappermal, Ganesan, Thirusubramanian, Sambas, Aceng

    ISSN: 2161-3915, 2161-3915
    Published: Chichester, UK John Wiley & Sons, Ltd 01.04.2025
    “…Handling of User's data effectively in the cloud has become a crucial task. Monitoring insider attacks in the cloud and securely transferring cookie files have…”
    Get full text
    Journal Article
  2. 2

    Orientation Hashcode and Articial Neural Network Based Combined Approach to Recognize Sign Language by Arif-Ul-Islam, Akhter, Shamim

    Published: IEEE 01.12.2018
    “…Hand sign recognition is an essential part in robot control, human computer interaction, communication with deaf or speech impaired people etc. where…”
    Get full text
    Conference Proceeding
  3. 3

    Hashing and data integrity: Reliability of hashing and granularity size reduction by Malinowski, Christopher, Noble, Richard

    ISSN: 1742-2876, 1873-202X
    Published: Elsevier Ltd 01.06.2007
    Published in Digital investigation (01.06.2007)
    “…Data assurance have come under scrutiny due to attacks on hashing schemes. This article explores a methodology for increasing the attack difficulty as well as…”
    Get full text
    Journal Article
  4. 4

    Case Based Modeling of Answer Points to Expedite Semi-Automated Evaluation of Subjective Papers by Roy, Chhanda, Chaudhuri, Chitrita

    ISSN: 2473-3571
    Published: IEEE 01.12.2018
    “…Researches have been carried out in the past and recent years for the automation of examination systems. But most of them target on-line examinations with…”
    Get full text
    Conference Proceeding
  5. 5

    Large-Scale Supervised Hashing for Cross-Modal Retreival by Karbil, Loubna, Daoudi, Imane

    ISSN: 2161-5330
    Published: IEEE 01.10.2017
    “…Matrix factorization technique has become a promising approach for cross-modality hashing, where projections are learned to represent data from multiple…”
    Get full text
    Conference Proceeding