Posts

System and methods for UICC-based secure communication

ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor....

Automatic Aesthetic Scoring

Image Aesthetics Scoring Engine The developed engine gets the image and outputs a score showing the amount of the beauty inside the image! The code is working on Android/iOS platform, The engine speed is about 100-200 ms which makes it suitable for a real-time engine. The core exploits GPU to compute aesthetic features from the image, and estimate the aesthetic score. Android ,  Computer Vision ,  Demo ,  iOS ,  Research ,  Aesthetic Feature Extraction ,  Aesthetics Scoring ,  Android ,  GPU ,  Image Aesthetics ,  iOS ,  Renderscript ,  Scoring Engine .

Maryam Mirzakhani, the only women to win Math Fields Medal

Image
Maryam Mirzakhani was first women to win maths' Fields Medal. She would be in our mind forever. RIP #MaryamMirzakhani in  Farshid Farhat 's Twitter

Photography Idea Retrieval

Integrating Deep-learned Models and Photography Idea Retrieval Intelligent Portrait Composition Assistance (IPCA) – Integrating Deep-learned Models and Photography Idea Retrieval, Farshid Farhat, Mohammad Kamani, Sahil Mishra, James Wang, ACM Multimedia 2017, Mountain View, CA, USA. ABSTRACT : Retrieving photography ideas corresponding to a given location facilitates the usage of smart cameras, where there is a high interest among amateurs and enthusiasts to take astonishing photos at anytime and in any location. Existing research captures some aesthetic techniques such as the rule of thirds, triangle, and perspectiveness, and retrieves useful feedbacks based on one technique. However, they are restricted to a particular technique and the retrieved results have room to improve as they can be limited to the quality of the query. There is a lack of a holistic framework to capture important aspects of a given scene and give a novice photographer informative feedback to tak...

That's why BLOGSPOT trumps versus wordpress

Hello, > I cannot verify the breach as I don't have access to the content. > But it is OK to empty the blog content and give me the permission. Upon further review, the offer to empty your sites no longer stands. You've continued to publish spam content across a large number of sites. As such, all of the blogs owned by your account have been suspended and will not be returned. Regards, Sal P. | Community Guardian |  WordPress .com

Vision Endeavors

Academic Endeavors at Pennsylvania State University Leveraging big visual data to predict severe weather conditions Discovering Triangles in Portraits for Supporting Photographic Creation Skeleton Matching with Applications in Severe Weather Detection Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval Shape matching using skeleton context for automated bow echo detection Detecting Vanishing Points in Natural Scenes with Application in Photo Composition Analysis Stochastic Modeling and Optimization of Stragglers Automatic Thumbnail Generation by Smart Cropping Evaluating the Combined Impact of Node Architecture and Cloud Workload Characteristics on Network Traffic and Performance/Cost Fork-Join Queue Modeling and Optimal Scheduling in Parallel Programming Frameworks Optimal Placement of Cores, Caches and Memory Controllers in Network On-Chip Towards Stochastically Optimizing Data Computing Flows Stochastic Model...

Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup

Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup , Farshid Farhat, Somayeh Salimi, Ahmad Salahi, IACR Cryptology ePrint Archive, 2011. Abstract Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses of the previous frameworks suggested for the UMTS AKA protocol. After that we propose a new protocol called private identification, authentication, and key agreement protocol (PIAKAP), for UMTS mobile network. Our suggested protocol combines identification and AKA stages of UMTS AKA protocol while eliminates disadvantages of related works and brings some new features to improve the UMTS AKA mechanism. These features consist of reducing the interactive rounds of the U...