Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

Bestsellers

Linear Algebra and Optimization with Applications to Machine Learning
Linear Algebra and Optimization with Applications to Machine Learning

Volume I: Linear Algebra for Computer Vision, Robotics, and Machine Learning
by Jean Gallier and Jocelyn Quaintance
Linear Algebra and Optimization with Applications to Machine Learning
Linear Algebra and Optimization with Applications to Machine Learning

Volume II: Fundamentals of Optimization Theory with Applications to Machine Learning
by Jean Gallier and Jocelyn Quaintance

 

  • articleNo Access

    A Novel Framework for Securing ECDH Encrypted DICOM Pixel Data Stored Over Cloud Using IPFS

    The future holds the possibility of hospitals sharing medical images obtained through non-invasive systems to patients remotely. The advent of cloud and the storage and deployment of medical healthcare images in the cloud has resulted in the increased need for application of Cryptographic techniques to protect them from unauthorized access and malicious attacks. The Digital Imaging and Communication in Medicine (DICOM) standard is more compatible across medical imaging instruments globally. The pixel data of DICOM images requires more privacy and security. A novel ECDS based cryptographic approach is suggested to encrypt the original DICOM image as well as the ROI pixel data extracted from DICOM images. Results computed experimentally have proved that medical image encryption via ECDH is more robust, efficient and faster than existing medical image encryption schemes.

  • chapterNo Access

    A cloud-based intelligent management system for electronic components

    Intelligent electronic components’ management systems (IECMS), which can automatically inquire about components’ stock and make inventories, were often proposed in recent years to improve the efficiency of material management. So far, research focused on system architecture and information management software. The design of components’ monitoring subsystems was neglected in practical implementations of IECMS for industrial environments. The existing schemes share the disadvantages of high complexity and cost. As IECMS are not widely applied, yet, to implementations of IECMS features of hardware customization, maintainability, real-time components’ monitoring and cloudbased stock tracking are added to provide an intelligent and economic solution for advanced material management applications. Preliminary test results prove its effectiveness in intelligent components management.

  • chapterNo Access

    Chapter 5: The Impact of Blockchain on Cloud and AI

    Both blockchain and disseminated registering are expecting a basic part in changing endeavors’ work environments and the way standard handling works. Their rise has not quite recently gained energy in the current business establishment yet has furthermore changed the way the universe of usage headway, storing, online trade, and various organizations limits. Regardless, challenges suffer in the wide execution of blockchain in cloud. This book area plans to introduce the impact of blockchain on cloud and how to diminish.

  • chapterNo Access

    Chapter 13: Enhancing Security and Privacy in Pharmacovigilance with Blockchain

    Blockchain provides privacy and security without centralized authority. This work analyzes cryptography applications in blockchain and analyzes efficient sharing of health records using Attribute-Based Encryption (ABE). Secure data sharing of sensitive information stored in cloud is very important as anybody can access it from anywhere in the world. This work aims to provide a secure sharing of medical records in cloud using enhanced Ciphertext Policy (CP-ABE) and Key Policy (KP-ABE) techniques along with data owner specifying the access control policies. In an open-networked system, machine learning algorithms are effectively used in pharmacovigilance to find the Adverse Drug Reaction (ADR). Securing this sensitive data in cloud is very important as PHRs privacy concern is very important.

  • chapterNo Access

    Cloud Computing: Comparative Study Own Server vs Cloud Server

    Cloud computing is internet based network diagram that represent internet, or various parts of it, as schematic clouds. The term, characteristics and services associated with internet based computing is called cloud computing. Characteristics means infrastructures, provisioning, network access and managed metering. The primary business associated model which is employed in software, platform and infrastructure as a service and common deployment model which is deployed by service providers and users to use and maintain the cloud services like private, public, community and hybrid clouds are discussed in this papers. In this paper cloud computing refers to different types of services and applications being delivered in the internet cloud but the fact is, in many cases the devices use to access such services and applications do not require any special applications. That is cloud computing is everywhere. Cloud computing also promise to cut operational and capital costs.