Biblio

Found 1097 results

Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G [H] I J K L M N O P Q R S T U V W X Y Z   [Show ALL]
H
H, Faheem Nikhat., Sait, Saad Yunus.  2022.  Survey on Touch Behaviour in Smart Device for User Detection. 2022 International Conference on Computer Communication and Informatics (ICCCI). :1–8.
Smart Phones being a revolution in this Modern era which is considered a boon as well as a curse, it is a known fact that most kids of the current generation are addictive to smartphones. The National Institute of Health (NIH) has carried out different studies such as exposure of smartphones to children under 12 years old, health risk associated with their usage, social implications, etc. One such study reveals that children who spend more than two hours a day, on smartphones have been seen performing poorly when it comes to language and cognitive skills. In addition, children who spend more than seven hours per day were diagnosed to have a thinner brain cortex. Hence, it is of great importance to control the amount of exposure of children to smartphones, as well as access to irregulated content. Significant research work has gone in this regard with a plethora of inputs features, feature extraction techniques, and machine learning models. This paper is a survey of the State-of-the-art techniques in detecting the age of the user using machine learning models on touch, keystroke dynamics, and sensor data.
ISSN: 2329-7190
H, R. M., Shrinivasa, R, C., M, D. R., J, A. N., S, K. R. N..  2020.  Biometric Authentication for Safety Lockers Using Cardiac Vectors. 2020 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS). :1—5.

Security has become the vital component of today's technology. People wish to safeguard their valuable items in bank lockers. With growing technology most of the banks have replaced the manual lockers by digital lockers. Even though there are numerous biometric approaches, these are not robust. In this work we propose a new approach for personal biometric identification based on features extracted from ECG.

H, R. M., Shet, U. Harshitha, Shetty, R. D., Shrinivasa, J, A. N., S, K. R. N..  2020.  Triggering and Auditing the Event During Intrusion Detections in WSN’s Defence Application. 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS). :1328–1332.
WSNs are extensively used in defence application for monitoring militant activities in various ways in large unknown territories. Here WSNs has to have large set of distributed systems in the form as sensors nodes. Along with security concerns, False Alarming is also a factor which may interrupt the service and downgrade the application further. Thus in our work we have made sure that when a trigger is raised to an event, images can be captured from the connected cameras so that it will be helpful for both auditing the event as well as capturing the scene which led to the triggering of the event.
H. Bahrami, K. Hajsadeghi.  2015.  "Circuit design to improve security of telecommunication devices". 2015 IEEE Conference on Technologies for Sustainability (SusTech). :171-175.

Security in mobile handsets of telecommunication standards such as GSM, Project 25 and TETRA is very important, especially when governments and military forces use handsets and telecommunication devices. Although telecommunication could be quite secure by using encryption, coding, tunneling and exclusive channel, attackers create new ways to bypass them without the knowledge of the legitimate user. In this paper we introduce a new, simple and economical circuit to warn the user in cases where the message is not encrypted because of manipulation by attackers or accidental damage. This circuit not only consumes very low power but also is created to sustain telecommunication devices in aspect of security and using friendly. Warning to user causes the best practices of telecommunication devices without wasting time and energy for fault detection.

H. Chi, Y. Chen, T. Jin, X. Jin, S. Zheng, X. Zhang.  2015.  "Photonics-assisted compressive sensing for sparse signal acquisition". 2015 Opto-Electronics and Communications Conference (OECC). :1-2.

Compressive sensing (CS) is a novel technology for sparse signal acquisition with sub-Nyquist sampling rate but with relative high resolution. Photonics-assisted CS has attracted much attention recently due the benefit of wide bandwidth provided by photonics. This paper discusses the approaches to realizing photonics-assisted CS.

H. Dai, X. Wu, L. Xu, G. Chen, S. Lin.  2013.  Using Minimum Mobile Chargers to Keep Large-Scale Wireless Rechargeable Sensor Networks Running Forever. 2013 22nd International Conference on Computer Communication and Networks (ICCCN). :1-7.
H. Ding, D. A. Castanon.  2017.  Multi-agent discrete search with limited visibility. 2017 Conference on Decision and Control).
H. Ding, D. Castanon.  2016.  Fast algorithms for UAV tasking and routing. 2016 IEEE Conference on Control Applications (CCA). :368-373.
H. Ding, D. A. Castanon.  2015.  Optimal solutions for classes of adaptive search problems. 2015 54th IEEE Conference on Decision and Control (CDC). :5749-5754.
H. Ding, D. A. Castanon.  2015.  Multi-object two-agent coordinated search. 2015 International Conference on Complex Systems Engineering (ICCSE). :1-6.
H. Ding, D. A. Castanon.  2015.  Optimal multi-vehicle adaptive search with entropy objectives. 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton). :780-785.
H. Dong, A. Ganz.  2017.  Pre-trip Training System for Seniors and People with Disabilities using Annotated Panoramic Video. Int. Conf. Info. and Comm. Technologies for Aging Well and e-Health (ICT4AWE). :150–156.
H. G. Oral, E. Mallada, D. F. Gayme.  2017.  Performance of Linear Networked Dynamical Systems over Strongly Connected Digraphs. 56th IEEE Conference on Decision and Control (to appear).
H. Guo, Z. Sun, P. Wang.  2015.  Channel Modeling of MI Underwater Communication Using Tri-Directional Coil Antenna. 2015 IEEE Global Communications Conference (GLOBECOM). :1-6.
H. Huang, S. Lin, L. Chen, J. Gao, A. Mamat, J. Wu.  2015.  Dynamic Mobile Charger Scheduling in Heterogeneous Wireless Sensor Networks. 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems. :465-466.
H. Huang, C. C. Ni, X. Ban, J. Gao, A. T. Schneider, S. Lin.  2014.  Connected wireless camera network deployment with visibility coverage. IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. :1204-1212.
H. K. Sharma, R. Tomar, J. C. Patni.  2015.  "HRJ_encryption: An ASCII code based encryption algorithm and its implementation". 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom). :1024-1027.

The transmission of data over a common transmission media revolute the world of information sharing from personal desktop to cloud computing. But the risk of the information theft has increased in the same ratio by the third party working on the same channel. The risk can be avoided using the suitable encryption algorithm. Using the best suited algorithm the transmitted data will be encrypted before placing it on the common channel. Using the public key or the private key the encrypted data can be decrypted by the authenticated user. It will avoid the risk of information theft by the unauthenticated user. In this work we have proposed an encryption algorithm which uses the ASCII code to encrypt the plain text. The common key will be used by sender or receiver to encrypt and decrypt the text for secure communication.

H. Kiragu, G. Kamucha, E. Mwangi.  2015.  "A fast procedure for acquisition and reconstruction of magnetic resonance images using compressive sampling". AFRICON 2015. :1-5.

This paper proposes a fast and robust procedure for sensing and reconstruction of sparse or compressible magnetic resonance images based on the compressive sampling theory. The algorithm starts with incoherent undersampling of the k-space data of the image using a random matrix. The undersampled data is sparsified using Haar transformation. The Haar transform coefficients of the k-space data are then reconstructed using the orthogonal matching Pursuit algorithm. The reconstructed coefficients are inverse transformed into k-space data and then into the image in spatial domain. Finally, a median filter is used to suppress the recovery noise artifacts. Experimental results show that the proposed procedure greatly reduces the image data acquisition time without significantly reducing the image quality. The results also show that the error in the reconstructed image is reduced by median filtering.

H. Li, T. wei, R. Cai, Q. Zhu, Y. Wang.  2017.  Deep Reinforcement Learning: Framework, Applications, and Embedded Implementations. 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
H. Liang, Z. Wang, B. Zheng, Q. Zhu.  2017.  Addressing Extensibility and Fault Tolerance in CAN-based Automotive Systems. 2017 IEEE/ACM International Symposium on Networks-on-Chip (NOCS).
H. M. Ruan, M. H. Tsai, Y. N. Huang, Y. H. Liao, C. L. Lei.  2015.  "Discovery of De-identification Policies Considering Re-identification Risks and Information Loss". 2015 10th Asia Joint Conference on Information Security. :69-76.

In data analysis, it is always a tough task to strike the balance between the privacy and the applicability of the data. Due to the demand for individual privacy, the data are being more or less obscured before being released or outsourced to avoid possible privacy leakage. This process is so called de-identification. To discuss a de-identification policy, the most important two aspects should be the re-identification risk and the information loss. In this paper, we introduce a novel policy searching method to efficiently find out proper de-identification policies according to acceptable re-identification risk while retaining the information resided in the data. With the UCI Machine Learning Repository as our real world dataset, the re-identification risk can therefore be able to reflect the true risk of the de-identified data under the de-identification policies. Moreover, using the proposed algorithm, one can then efficiently acquire policies with higher information entropy.