Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Song Feng Lu"'
Publikováno v:
Neutrosophic Sets and Systems, Vol 58, Pp 367-378 (2023)
Large data volumes make manually keeping and preserving health records for future reference problematic. Most unusual is the coronavirus epidemic's overcrowding of hospitals. The Secure Pattern Electronic Healthcare Records (SPEHR) scheme provides a
Externí odkaz:
https://doaj.org/article/5709dd468e2642cda7fcc139240270e0
Publikováno v:
European Journal of Remote Sensing, Vol 52, Iss 0, Pp 2-15 (2019)
Image similarity or distortion assessment is fundamental to a wide range of applications throughout the field of image processing and computer vision. Many image similarity measures have been proposed to treat specific types of image distortions. Mos
Externí odkaz:
https://doaj.org/article/e1334e70cd6e4cae8a301ad9ee2284b6
Publikováno v:
Applied Sciences, Vol 7, Iss 8, p 786 (2017)
Facial recognition is one of the most challenging and interesting problems within the field of computer vision and pattern recognition. During the last few years, it has gained special attention due to its importance in relation to current issues suc
Externí odkaz:
https://doaj.org/article/414cb0445f434895961269cd93ed82fa
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030980146
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::aa9bf46889657abdd57a03be33def275
https://doi.org/10.1007/978-3-030-98015-3_49
https://doi.org/10.1007/978-3-030-98015-3_49
Publikováno v:
International Journal of Computer Applications. 167:1-5
Publikováno v:
International Journal of Applied Mathematics & Computer Science; 2022, Vol. 32 Issue 1, p139-146, 8p
Autor:
Fairouz Sher Ali, Song Feng Lu
Publikováno v:
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY. 15:7423-7434
Searchable encryption allows a remote server to search over encrypted documents without knowing the sensitive data contents. Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keyword Searches (CKS) schemes impr
Publikováno v:
DEStech Transactions on Computer Science and Engineering.
The current web security algorithms faced some drawbacks which making them under breakdown situations, these algorithms are such as SHA-1 and MD5 which they are already hacked. This work proposes a new digital signature scheme for building a web secu
Publikováno v:
DEStech Transactions on Computer Science and Engineering.
Publikováno v:
Computer Science and Technology.