•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

A business model for a South African government public cloud platform

Author:
Mvelase, P. , Dlamini, Z. , Macleod, D. , Dlodlo, N. , Sithole, H.
Publisher:
IEEE
Year
: 2014
DOI: 10.1109/ICACCCT.2014.7019432
URI: http://libsearch.um.ac.ir:80/fum/handle/fum/1020228
Keyword(s): image processing,infrared imaging,steganography,DCT based attacks,RS attacks,X2 attacks,generated cover image,generation method,sample pair attacks,secret thermal image,steganography,Authentication,Communications technology,Computer science,Discrete wavelet transforms,Histograms,PSNR,Generation technique,Steganography,Thermal image
Collections :
  • Latin Articles
  • Show Full MetaData Hide Full MetaData
  • Statistics

    A business model for a South African government public cloud platform

Show full item record

date accessioned2020-03-12T20:38:01Z
date available2020-03-12T20:38:01Z
date issued2014
identifier other6880662.pdf
identifier urihttp://libsearch.um.ac.ir:80/fum/handle/fum/1020228?locale-attribute=en
formatgeneral
languageEnglish
publisherIEEE
titleA business model for a South African government public cloud platform
typeConference Paper
contenttypeMetadata Only
identifier padid8144693
subject keywordsimage processing
subject keywordsinfrared imaging
subject keywordssteganography
subject keywordsDCT based attacks
subject keywordsRS attacks
subject keywordsX2 attacks
subject keywordsgenerated cover image
subject keywordsgeneration method
subject keywordssample pair attacks
subject keywordssecret thermal image
subject keywordssteganography
subject keywordsAuthentication
subject keywordsCommunications technology
subject keywordsComputer science
subject keywordsDiscrete wavelet transforms
subject keywordsHistograms
subject keywordsPSNR
subject keywordsGeneration technique
subject keywordsSteganography
subject keywordsThermal image
identifier doi10.1109/ICACCCT.2014.7019432
journal titleST-Africa Conference Proceedings, 2014
filesize511914
citations0
contributor rawauthorMvelase, P. , Dlamini, Z. , Macleod, D. , Dlodlo, N. , Sithole, H.
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace