The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays cloud services have become a cost-effective platform for sharing data and performing large scale computations. As outsourcing data to a third party involves security and privacy concerns, data should be sent to the cloud in encrypted form. To handle access control on encrypted cloud data, Ciphertext-Policy Attribute-based Encryption (CP-ABE) has become very popular. In this scheme data can...
Attribute-based encryption schemes provide read access to data based on users' attributes. In these schemes, user privacy is compromised as the access policies are visible. This privacy issue has been addressed in literature by enabling the data owner to obfuscate the policy in a setting where a single authority generates decryption keys. However, a single authority can figure out the hidden access...
In this paper we explore the problem of providing selective read/write access to the outsourced data for clients using mobile devices in an environment that supports users from multiple domains and where attributes are generated by multiple authorities. We consider Ciphertext-Policy Attribute-based Encryption (CP-ABE) scheme as it can provide access control on the encrypted outsourced data. One limitation...
Recently electromyography (EMG) based speech signals have been used as pattern recognition of phoneme, vocal frequency estimation, browser interface, and classification of speech related problem identification. Attempts have been made to use EMG signal for sub-vocal speech pattern recognition of Hindi phonemes and Hindi words. That provides the command sub-vocally to control the devices. Sub-vocal...
Sub-vocal speech recognition provides Silent speech communication that does not disturb or interfere with the surrounding, thus confidential information can be submitted securely. Sub-vocal speech depends on the brain's normal output of peripheral nerves and muscles. In this paper, we introduce a new method for statistical features extraction to detect and classify the for sub-vocal EMG pattern. This...
Outsourcing data to the cloud for computation and storage has been on rise in recent years. In this paper we investigate the problem of supporting write operation on the outsourced data for clients using mobile devices. We consider the Attribute-based Encryption (ABE) scheme as it is well suited to support access control in outsourced cloud environment. Currently there is a gap in the literature on...
EMG pattern recognition has been developed to interpret the performance of different functional movements. It can be used to develop the movement control techniques of assistive devices for people who are physically disabled. Suitable features in time domain are extracted from three different hand movements. The EMG signal was recorded from Cubitus (Elbow) bending, Carpus (Wrist) twist, Brachium (Arm)...
In this paper we present EEG signal classification used to design Brain-Computer Interface (BCI) system based on imagination of movements of the left and the right hand wrist. A comparative study of two different classifiers has been reported for four different movement of each of the wrist. SVM classifier indicates the average classification accuracy of 94% for the same movement (right Vs left) of...
We study the problem of finding a minimum energy broadcast tree in duty cycled wireless sensor networks. In such networks, every node has a wakeup schedule and is awake and ready to receive packets or transmit in certain time slots during the schedule and asleep during the rest of the schedule. We assume that a forwarding node needs to stay awake to forward a packet to the next hop neighbor until...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.