EFFICIENT METHOD FOR CLOUD DATA STORAGE AND SECURITY BASED ON THIRD PARTY AUDITOR
Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY
Author(s): CHADCHANKAR AMARNATH S.
Abstract: This cloud computing to realize being shifted into the next generation with. Application software and database are stored has changed. Now they cloud data centers in which safety is a concern from the point of view of the client are stored in the. Batteries that store and manage data without capital investment are used which are not well understood is the many security challenges paper cloud data integrity and security of data stored in the servers is focused on data integrity verification is a third party auditor that data integrity check from time to time on behalf of the client is authorized to use. Customer data from third party auditor of information gets lost when data integrity is not only data integrity verification, the proposed system also supports data mobility. The work that has been done in this online data mobility to public audit and sham Supporting. Audit for inserting and deleting data modifications functions, monitors the proposed system’s ability to audit both public
- Publication Date: 25-May-2014
- DOI: 10.15224/978-1-63248-028-6-01-110
- Views: 0
- Downloads: 0
FACIAL RECOGNITION BASED ON BACK PROPAGATION TECHNIQUE
Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY
Author(s): MOHAMMAD KAISB AL-HASNAWI , TAREQ ALI AL-SAADI , ZAID ABASS FADAHL
Abstract: Face recognition has received considerable attention from researchers in the areas of biometrics, pattern recognition, and computer vision. Security measures in airports can apply face recognition for passport verification, establishment of a list of criminals in police departments, visa processing, electoral identification verification, and ATM card security measure. A computational model of face recognition based on the images of a person captured via surveillance cameras is proposed in this study. This model is simple, accurate, and fast in several constrained environments, such as a household or an office. Back propagation method automatically improves the capabilities of face recognition systems through experimentation, with problems and goals stated clearly. With regard to the research design, a general methodology is adopted to achieve the research objectives.
- Publication Date: 25-May-2014
- DOI: 10.15224/978-1-63248-028-6-01-111
- Views: 0
- Downloads: 0