NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 17
1.
Celotno besedilo

PDF
2.
  • A Comparative Study of Priv... A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing
    Peraković, Dragan; Joshi, Bineet; Joshi, Bansidhar ... International journal of cloud applications and computing, 09/2022, Letnik: 12, Številka: 1
    Journal Article
    Recenzirano

    In cloud computing, a third party hosts a client's data, which raises privacy and security concerns. To maintain privacy, data should be encrypted by cryptographic techniques. However, encrypting the ...
Celotno besedilo
3.
  • Security threats and their ... Security threats and their mitigation in infrastructure as a service
    Joshi, Bineet Kumar; Shrivastava, Mohit Kumar; Joshi, Bansidhar Perspectives in science, September 2016, 2016-09-00, Letnik: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Cloud computing is a hot technology in the market. It permits user to use all IT resources as computing services on the basis of pay per use manner and access the applications remotely. ...
Celotno besedilo

PDF
4.
  • A Novel Deep Learning Based Gender Classification, Expression Recognition and Emoticon Generation
    Joshi, Bansidhar; Joshi, Bineet Kumar; Kumar, Sanjeev 2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT), 2024-Feb.-9, Letnik: 5
    Conference Proceeding

    Image is crucial in determining the gender and emotion of an individual in the digital age; however, the issue is evidently with the current methodologies. Implementing deep learning algorithms into ...
Celotno besedilo
5.
  • Securing cloud computing en... Securing cloud computing environment against DDoS attacks
    Joshi, B.; Vijayan, A. S.; Joshi, B. K. 2012 International Conference on Computer Communication and Informatics, 2012-Jan.
    Conference Proceeding

    Cloud computing is becoming one of the next IT industry buzz word. However, as cloud computing is still in its infancy, current adoption is associated with numerous challenges like security, ...
Celotno besedilo
6.
  • Early Detection of Distribu... Early Detection of Distributed Denial of Service Attack in Era of Software-Defined Network
    Kumar Joshi, Bineet; Joshi, Nitin; Chandra Joshi, Mahesh 2018 Eleventh International Conference on Contemporary Computing (IC3), 2018-August
    Conference Proceeding

    A Distributed Denial of Service (DDoS) attack try to make services or resources unavailable to legitimate customers of that service or resource. These attacks are relatively easy to perform and ...
Celotno besedilo
7.
  • Performance analysis of mob... Performance analysis of mobile nodes in ad hoc network using different wireless communication channel models
    Joshi, Bineet; Joshi, Bansidhar 2011 3rd International Conference on Electronics Computer Technology, 2011-April, Letnik: 5
    Conference Proceeding

    Wireless communication channels experience high variability in channel quality due to a variety of phenomenon, including multipath, fading, atmospheric effects, and obstacles. Due to this different ...
Celotno besedilo
8.
  • Lower Order Krawtchouk Mome... Lower Order Krawtchouk Moment-Based Feature-Set for Hand Gesture Recognition
    Kaur, Bineet; Joshi, Garima Advances in human-computer interaction, 01/2016, Letnik: 2016
    Journal Article
    Recenzirano
    Odprti dostop

    The capability of lower order Krawtchouk moment-based shape features has been analyzed. The behaviour of 1D and 2D Krawtchouk polynomials at lower orders is observed by varying Region of Interest ...
Celotno besedilo

PDF
9.
  • Identification of ISL Alpha... Identification of ISL Alphabets Using Discrete Orthogonal Moments
    Kaur, Bineet; Joshi, Garima; Vig, Renu Wireless personal communications, 08/2017, Letnik: 95, Številka: 4
    Journal Article
    Recenzirano

    In this paper, discrete orthogonal moment-based shape features up to 5th order are proposed for Indian sign language (ISL) recognition system. The shape recognition capability of discrete orthogonal ...
Celotno besedilo
10.
  • Indian sign language recogn... Indian sign language recognition using Krawtchouk moment-based local features
    Kaur, Bineet; Joshi, Garima; Vig, Renu The imaging science journal, 04/2017, Letnik: 65, Številka: 3
    Journal Article
    Recenzirano

    In this paper, Krawtchouk moment-based shape features at lower orders are proposed for Indian sign language (ISL) recognition system which gives local information about the shape from a specific ...
Celotno besedilo
1 2
zadetkov: 17

Nalaganje filtrov