Study of discrete PID controller for DC motor speed control using MATLAB

S Balamurugan, A Umarani - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
DC motors are known for simple design and consistency are used for control area section of
the industry. In many variable speed systems, it is commonly used where wide speed ranges …

Jade owl: Jpeg 2000 forensics by wavelet offset consistency analysis

Q Bammey - 2023 8th International Conference on Image …, 2023 - ieeexplore.ieee.org
In a world teeming with digital images, the credibility of visual data has become of
paramount importance. While it is now simpler than ever to manipulate an image for …

Secure and efficient medical image transmission by new tailored visual cryptography scheme with LS compressions

S Manimurugan, C Narmatha - … of Digital Crime and Forensics (IJDCF …, 2015 - igi-global.com
Exchanging a medical image via network from one place to another place or storing a
medical image in a particular place in a secure manner has become a challenge. To …

Biometric privacy using visual cryptography, halftoning and watermarking for multiple secrets

K Anusree, GS Binu - 2014 IEEE National Conference on …, 2014 - ieeexplore.ieee.org
It is important to secure the privacy of digital face image that are stored in central database.
To impart privacy to such biometric face images, first the digital face image is split into two …

[PDF][PDF] Enhanced security system using symmetric encryption and visual cryptography

RK HS, PK HR, KB Sudeepa… - International Journal of …, 2013 - researchgate.net
With the rapid development of internet, transfer of data reliably and securely has become
one of the challenges. In this paper we have introduced a novel visual cryptographic …

Data sharing attribute-based secure with efficient revocation in cloud computing

G Elavarasan, S Veni - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
In recent days, cloud computing is one of the emerging fields. It is a platform to maintain the
data and privacy of the users. To process and regulate the data with high security, the …

Secure medical image-sharing mechanism based on visual cryptography in EHR system

D Yang, I Doh, KJ Chae - 2018 20th International Conference …, 2018 - ieeexplore.ieee.org
Securely sharing electronic health records (EHR) has attracted attention in medical
environment. We discuss critical issues related to EHR-sharing and provide how to share a …

An Enhanced Vehicle to Cloud Communication by Prediction Based Machine Learning Approaches

SP Sasirekha, N Mohanasudaram… - … on Computing and …, 2020 - ieeexplore.ieee.org
Vehicle utilization as mobile sensor functions like as a catalyst for most of dense vehicle
sensing based application like intelligent traffic control and heterogeneous vehicular …

Task-Driven Approach for Deadline Based Scheduling Across Sensor Networks

P Sherubha, N Mohanasundaram… - … on Computing and …, 2020 - ieeexplore.ieee.org
Tremendous evolution towards cloud computing provides changing demands to work in
virtualized environment, ie applications such as Internet of Things (IoT), healthcare system …

Secret code authentication using enhanced visual cryptography

R Ajjipura Basavegowda… - Emerging Research in …, 2014 - Springer
Secret code (password) is widely used in many applications like data transfer, sharing data,
and login to emails or internet banking. So a big necessity to have a strong authentication to …