Substantial simulations going from equipped along with attached chip show up that fact our coordination in attaining rich disappointment contribution moreover misleading portrait, as a consequence low conversation cost o...
Estimation of rainfall and temperature for a desired return period is one of the pre-requisite for planning, design and management of the civil structures at the project site. This paper illustrates the use of extreme va...
With the popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing block chain of medical data mainly incl...
Topic modelling is a powerful technique for analysis of large document collection. Topic modelling is used for finding hidden topic from the collection of document. In the twitter api, it is essential all the tweet docum...
In this paper, we have used ECG signal for secure key exchange between two nodes of the same Body Sensor Network (BSN). InterPulsed Interval (IPI) of the ECG signal is considered as a biometric characteristic for key gen...
EP ID EP88450
DOI 10.9756/BIJSESC.4336
Views 146
Downloads 0
How To Cite
R. Chitra, Dr. V. Seenivasagam (2013). . Bonfring International Journal of Software Engineering and Soft Computing, 3(1),
1-7. https://europub.co.uk/articles/-A-88450
Sign In Europub
For faster login or register use your social account.
Networks Flaws and Filtering Using KNOD Algorithms
Substantial simulations going from equipped along with attached chip show up that fact our coordination in attaining rich disappointment contribution moreover misleading portrait, as a consequence low conversation cost o...
Assessment of Rainfall and Temperature using OSA Estimators of Extreme Value Distributions
Estimation of rainfall and temperature for a desired return period is one of the pre-requisite for planning, design and management of the civil structures at the project site. This paper illustrates the use of extreme va...
Block Chain Technology for Privacy Protection for Cloudlet-based Medical Data Sharing
With the popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing block chain of medical data mainly incl...
Topic Categorization on Social Network Using Latent Dirichlet Allocation
Topic modelling is a powerful technique for analysis of large document collection. Topic modelling is used for finding hidden topic from the collection of document. In the twitter api, it is essential all the tweet docum...
Secure Medical Data Transmission in Body Area Sensor Networks Using Dynamic Biometrics and Steganography
In this paper, we have used ECG signal for secure key exchange between two nodes of the same Body Sensor Network (BSN). InterPulsed Interval (IPI) of the ECG signal is considered as a biometric characteristic for key gen...