GAL: مدل گام به گام برای خودکار تشخیص سایه ابر در HICO تصاویر اقیانوسی با استفاده از فیلتر های هدایت شونده، اختصاص پیکسل، و پیوندهای هندسی GAL: A stepwise model for automated cloud shadow detection in HICO oceanic imagery utilizing guided filter, pixel assignment, and geometric linking Abstract: Detection of cloud shadow pixels is an important step in image processing in ...
یک روش برای حمایت از تحرک در شبکه نرم افزار تعریف شده بر اساس محاسبات ابری همراه An approach for mobility support in software defined network based mobile cloud computing Abstract: There has been a phenomenal increase in the applications developed specifically for use on mobile devices, such as smart phones, which are connected to the cloud computing environm ...
به سمت بیومتریک امن، قابل اعتماد، و افزایش حریم خصوصی در ابر Toward secure, trusted, and privacy-enhanced biometrics in the cloud Abstract: Recent changes in pervasive sensing applications require software systems that can address diverse technical, architectural, and human issues. Research on wireless sensor networks has served as technical fundamentals, mobi ...
به سمت بیومتریک امن، قابل اعتماد، و افزایش حریم خصوصی در ابر Toward secure, trusted, and privacy-enhanced biometrics in the cloud Abstract: Biometric technology has been used for decades as a strong method to identify and authenticate individuals. As for its effectiveness and accuracy, biometric technology has gained popularity in a wide range of fields and applications, inc ...
به سمت سرویس های ذخیره سازی ابر امن Towards secure cloud storage services Abstract: Cloud computing is anticipated to revolutionize the Information and Communication Technology sector and has been a mainstream of research over the last decade. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization. The above mentioned features en ...
ارائه حفظ حریم خصوصی از ابر مسکوني residential Providing privacy from the residential cloud Abstract: The growth of mobile devices and computing has continued in recent years to the point where mobile network providers must not only upgrade their networks to serve the new traffic-intensive content that their users demand, but to actually turn to alternative methods of delive ...