Cryptographic protocols for key exchange have an aim of secure exchange of secret keys over the public network. Password based authenticated key exchange (PAKE) protocols are popularly used for communication purposes due...
In this paper we present the novel technique for detection of breast boundary (also known as Breast contour, breast edge, skin-air interface or also called skin-line). Breast boundary extraction is an important preproces...
Home Automation industry is growing rapidly; this is fuelled by the need to provide supporting systems for the elderly and the disabled, especially those who live alone. Home automation systems must comply with the house...
A Survey On Security Issues & Concerns To Social Networks
A Survey On Security Issues & Concerns To Social Networks
A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols
Cryptographic protocols for key exchange have an aim of secure exchange of secret keys over the public network. Password based authenticated key exchange (PAKE) protocols are popularly used for communication purposes due...
Breast Boundary Detection in Mammogram using Entropy
In this paper we present the novel technique for detection of breast boundary (also known as Breast contour, breast edge, skin-air interface or also called skin-line). Breast boundary extraction is an important preproces...
Query Explication by Semantic Approach
Query Explication by Semantic Approach
A Sustainable Automated System for Elderly People Using Voice Recognition and Touch Screen Technology
Home Automation industry is growing rapidly; this is fuelled by the need to provide supporting systems for the elderly and the disabled, especially those who live alone. Home automation systems must comply with the house...