سفارش تبلیغ
صبا ویژن
این قرآن ریسمان خدا و نور روشن گر و درمانی سودبخش است . [پیامبر خدا صلی الله علیه و آله]
لوگوی وبلاگ
 

دسته بندی موضوعی یادداشتها
 
دانلود رایگان مقاله ISI ، دانلود مقالات IEEE ، دانلود رایگان مقاله IEEE ، دانلود مقاله ، دانلود مقالات ISI ، دانلود رایگان مقاله ACM ، دنلود مقالات ISI ، دانلود رایگان مقاله Science Direct ، دانلود رایگان مقاله از ACM ، دانلود رایگان مقالات مهندسی ، دانلود رایگان مقالات ACM ، دانلود رایگان مقاله مهندسی ، دانلود رایگان مقالات IEEE ، دانلود رایگان مقاله Springer ، دانلود رایگان مقاله آی اس آی ، دانلود مقالات آی اس آی ، دانلود مقاله آی اس آی ، یوزرنیم و پسورد دانشگاه های معتبر ، دانلود مقاله از IEEE ، دانلود رایگان مقالات آی اس آی ، دانلود رایگان مقاله ، دانلود ، یوزرنیم و پسورد سایتهای علمی ، دانلود رایگان مقالات ISI ، دانلود رایگان مقاله Science Direc ، دانلود رایگان ، دانلود رایگان مقالا ، دانلود رایگان مقالات IEEE، دانلود رایگان مقالات ISI، دانلود مقال ، Free ISI Paper Download ، ISI Paper Download ، Paper Download ، انلود رایگان مقالات IEEE ، دانلود رایگان مقالات مهندسی. دانلود رایگان مقاله Springer. دانلو ، دانلود مقاله ISI ، رایگان مقالات ACM ، و پسورد سایتهای علمی ، یوزرنیم ، دانلود مقالات آی ، دانلود مقالات IEEE, دنلود مقالات ISI, دانلود رایگان مقاله IEEE, ، دانلود، مقاله، ISI، 2013، رایانش فراگیر ،

آمار و اطلاعات

بازدید امروز :13
بازدید دیروز :2
کل بازدید :257989
تعداد کل یاداشته ها : 160
103/10/4
7:15 ص

به نام خدا

Title: A Secure Authentication Protocol among Mobile Phone and Wireless Sensor Networks

Authors: Ndibanje Bruce, Hoon Jae Lee

Abstract: The interaction between mobile phone and wireless sensor networks has increased these days due to the WSN emergence and its ubiquitous nature. Through cellular network, a user can access gateway of wireless sensor networks and gets the data. This paper proposes a secure authentication protocol where a user is strongly verified before accessing the data. The secure authentication proposed protocol provides many security principles to the users for instance user, mutual authentication, and secure session key establishment. Furthermore, security analysis shows .that the proposed protocol possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.   

Publish Year: 2013

Published in:  ICACT - IEEE

Number of Pages: 8

موضوع: امنیت شبکه (Network Security) – احراز هویت (Authentication)

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  

به نام خدا

Title: Accelerating E-Commerce Sites in the Cloud

Authors: Wei Hao, James Walden, Chris Trenkamp

Abstract: E-commerce web sites typically have large fluctuations in their IT resource usage, while rapid elasticity is an essential characteristic of cloud computing. These characteristics make the cloud a good fit for hosting e-commerce web sites. Cloud providers deploy their cloud in their data centers. However, cloud providers usually have a limited number of data center locations around the world. Thus, e-commerce web sites in the cloud may be far away from their customers. Long client-perceived response latency may cause e-commerce web sites to lose business. To solve this problem, we propose a virtual proxy solution to reduce the response latency of the e-commerce site in the cloud. In our approach, a virtual proxy platform is designed to cache applications and data of e-commerce sites. A k-means based table partitioning algorithm is designed to select frequently used data from the database in the cloud. We have used an industrial e-commerce benchmark TPC-W to evaluate the performance of our approach. The experimental results show that our approach can significantly reduce the client-perceived response time.   

Publish Year: 2013

Published in: CCNC – IEEE

موضوع: تجارت الکترونیک (E-Commerce)

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  

به نام خدا

Title: Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card

Authors: Devane, S.; Chatterjee, M.; Phatak, D.

Abstract: The rapid growth of e-commerce for buying and selling electronic goods or intangible goods has necessitated the need for development of a number of e-commerce protocols, which ensure integrity, confidentiality, atomicity and fair exchange. In this paper we propose an e-commerce protocol for performing business over the Internet. The protocol uses a smart card for ensuring mutual authentication, dispute resolution and fair exchange and reduces reliance on a trusted third party. Atomicity is also maintained in the protocol.   

Publish Year: 2007

Published by: IAS – IEEE

موضوع: تجارت الکترونیک (Electronic Commerce)

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

 

ایران سای – مرجع علمی فنی مهندسی

حامی دانش بومی ایرانیان


  

به نام خدا

Title: Using the idea of the sparse representation to perform coarse- to-fine face recognition

Authors: Yong Xu , Qi Zhu a , Zizhu Fan , David Zhang d , Jianxun Mi a , Zhihui Lai

Abstract: In this paper, we propose a coarse-to-fine face recognition method. This method consists of two stages and works in a similar way as the well-known sparse representation method. The first stage determines a linear combination of all the training samples that is approximately equal to the test sample. This stage exploits the determined linear combination to coarsely determine candidate class labels of the test sample. The second stage again deter- mines a weighted sum of all the training samples from the candidate classes that is approximately equal to the test sample and uses the weighted sum to perform classification. The rationale of the proposed method is as follows: the first stage identifies the classes that are far from the test sample and removes themfromthe set of the training samples. Then the method will assign the test sample into one of the remaining classes and the classification problem becomes a simpler one with fewer classes. The proposed method not only has a high accuracy but also can be clearly interpreted.   

Publish Year: 2013

Published in: Information Sciences - Science Direct

موضوع: شناسایی چهره (Face Detection)

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

 

ایران سای – مرجع علمی فنی مهندسی

حامی دانش بومی ایرانیان

 


  

به نام خدا

Title: Application of the Mean Field Methods to MRF Optimization in Computer Vision

Authors: Masaki Saito Takayuki Okatani Koichiro Deguchi

Abstract: The mean field (MF) methods are an energy optimization method for Markov random fields (MRFs). These methods, which have their root in solid state physics, estimate the marginal density of each site of an MRF graph by iterative computation, similarly to loopy belief propagation (LBP).It appears that, being shadowed by LBP, the MF methods have not been seriously considered in the computer vision community. This study investigates whether these methods are useful for practical problems, particularly MPM (Maxi-mum Posterior Marginal) inference, in computer vision. To be specific, we apply the naive MF equations and the TAP (Thou less-Anderson-Palmer) equations to interactive segmentation and stereo matching. In this paper, firstly, we show implementation of these methods for computer vision problems. Next, we discuss advantages of the MF methods to LBP. Finally, we present experimental results that the MFmethods are well comparable to LBP in terms of accuracy and global convergence; furthermore, the 3rd-order TAP equation often outperforms LBP in terms of accuracy.   

Publish Year: 2012

Published in: CVPR - IEEE

موضوع: بینایی ماشین (Computer Vision)

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

 

ایران سای – مرجع علمی فنی مهندسی

حامی دانش بومی ایرانیان

 


  
   1   2      >