Search Results - "Hashcode"
-
1
Insider Attack Monitoring and Secured Data Transfer Using KPCC and BiO‐ELSTM in Cloud Computing
ISSN: 2161-3915, 2161-3915Published: Chichester, UK John Wiley & Sons, Ltd 01.04.2025Published in Transactions on emerging telecommunications technologies (01.04.2025)“…Handling of User's data effectively in the cloud has become a crucial task. Monitoring insider attacks in the cloud and securely transferring cookie files have…”
Get full text
Journal Article -
2
Orientation Hashcode and Articial Neural Network Based Combined Approach to Recognize Sign Language
Published: IEEE 01.12.2018Published in 2018 21st International Conference of Computer and Information Technology (ICCIT) (01.12.2018)“…Hand sign recognition is an essential part in robot control, human computer interaction, communication with deaf or speech impaired people etc. where…”
Get full text
Conference Proceeding -
3
Hashing and data integrity: Reliability of hashing and granularity size reduction
ISSN: 1742-2876, 1873-202XPublished: Elsevier Ltd 01.06.2007Published in Digital investigation (01.06.2007)“…Data assurance have come under scrutiny due to attacks on hashing schemes. This article explores a methodology for increasing the attack difficulty as well as…”
Get full text
Journal Article -
4
Case Based Modeling of Answer Points to Expedite Semi-Automated Evaluation of Subjective Papers
ISSN: 2473-3571Published: IEEE 01.12.2018Published in IEEE International Advance Computing Conference (01.12.2018)“…Researches have been carried out in the past and recent years for the automation of examination systems. But most of them target on-line examinations with…”
Get full text
Conference Proceeding -
5
Large-Scale Supervised Hashing for Cross-Modal Retreival
ISSN: 2161-5330Published: IEEE 01.10.2017Published in 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA) (01.10.2017)“…Matrix factorization technique has become a promising approach for cross-modality hashing, where projections are learned to represent data from multiple…”
Get full text
Conference Proceeding