IMPLEMENTATION OF RECONSTRUCTION OF UNDERWATER IMAGE USING FPGA
Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): MANGESH KAKDE , R.C. IYER
Abstract: Reconstruction of an underwater object from a sequence of images distorted by moving water waves is a challenging task. A new approach is presented in this paper. We make use of the bispectrum technique to analyze the raw image sequences and recover the phase information of the true object. We test our approach on both simulated and real-world data, separately. Results show that our algorithm is very promising. Such technique has wide applications to areas such as ocean study and submarine observation
- Publication Date: 03-Feb-2020
- DOI: 10.15224/978-981-07-1403-1-241
- Views: 0
- Downloads: 0
CLOUD SECURITY THREATS
Published In: INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, COMMUNICATION AND NETWORKS
Author(s): K. MANJU , SIBU THOMAS
Abstract: Cloud is a fundamental shift in the IT architecture, which is why there’s a lot fear amongst enterprise to move towards it. Knowing the types of security risks involved can help reduce that fear and increase its adoption. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Implementing a Cloud computing solution requires many parameters to be preconceived, including the premise of security. The aim of this paper is to highlight the security challenges currently faced in the Cloud computing. The importance of security requirements is discussed by illustrating the Cloud trade of like identifying the right cloud service provider, vulnerabilities of shared technologies, data aggregation programs. Security in Cloud computing is dependent on the capabilities and constraints of the Cloud.
- Publication Date: 03-Jun-2011
- DOI: 10.15224/978-981-07-1847-3-1027
- Views: 0
- Downloads: 0