Showing 73–84 of 468 results

  • An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

    0 out of 5
    5,500

    An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Abstract? Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The shared data files generally have the characteristic of multilevel hierarchy, particularly in the area of healthcare and the military. < final...

  • An Efficient Green Control Algorithm in Cloud Computing for Cost Optimization

    0 out of 5
    4,500

    An Efficient Green Control Algorithm in Cloud Computing for Cost Optimization Abstract? An Efficient Green Control Algorithm in Cloud. Computing for Cost OptimizationCloud computing is a new paradigm for delivering remote computing resources through a network. However, achieving an energy-ef?ciency control and simultaneously satisfying a performance guarantee have become critical issues for cloud providers. In…

  • An Efficient Privacy-Preserving Ranked Keyword Search Method

    0 out of 5
    4,500

    An Efficient Privacy-Preserving Ranked Keyword Search Method Abstract?Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop ef?cient and reliable ciphertext search techniques. One challenge is that the relationship between documents will be normally concealed in the process of encryption, which will…

  • An Efficient Ranked Multi-Keyword Search for Multiple Data Owners over Encrypted Cloud Data

    0 out of 5
    4,500

    An Efficient Ranked Multi-Keyword Search for Multiple Data Owners over Encrypted Cloud Data Abstract-With the development of cloud storage, more data owners are inclined to outsource their data to cloud services. For privacy concerns, sensitive data should be encrypted before outsourcing. There are various searchable encryption schemes to ensure data availability. However, the existing search…

  • An Integrated Semantic Web Service Discovery and Composition Framework

    0 out of 5
    4,500

    An Integrated Semantic Web Service Discovery and Composition Framework Abstract? An Integrated Semantic Web Service Discovery and Composition Framework. A theoretical analysis of graph-based service composition in terms of its dependency with service discovery. Driven by this analysis we define a composition framework by means of integration with fine-grained I/O service discovery that enables the…

  • An Intelligent Economic Approach for Dynamic Resource Allocation in Cloud Services

    0 out of 5
    4,500

    An Intelligent Economic Approach for Dynamic Resource Allocation in Cloud Services Abstract?With Inter-Cloud, distributed cloud and open cloud exchange < Final Year Projects 2016 > OCX emerging, a comprehensive resource allocation approach is fundamental to highly competitive cloud market. Oriented to infrastructure as a service (IaaS), an intelligent economic approach for dynamic resource allocation (IEDA)…

  • An IoT Based System for Remote Patient Monitoring

    0 out of 5
    5,500

    An IoT Based System for Remote Patient Monitoring Abstract? a surgical procedure, patients are monitored in an ICU until physically stable, after which are discharged to a ward for further evaluation and recovery. Usually, ward evaluation does not imply continuous physiological parameters monitoring and therefore patient relapse is not uncommon. The present paper describes the…

  • Product on sale

    An Outlier Detect Algorithm using Big Data Processing and Internet of Things Architecture

    0 out of 5
    Original price was: ₹6,000.Current price is: ₹4,500.

    An Outlier Detect Algorithm using Big Data Processing and Internet of Things Architecture Abstract-Data management in the Internet of Things is a crucial aspect. Considering a world of interconnected objects which constantly exchange many kinds of information, the volume of generated data and involved processes, implies that data management becomes critical. The aim of this…

  • Analysis, Modeling and Simulation of Workload Patterns in a Large-Scale Utility Cloud

    0 out of 5
    4,500

    Analysis, Modeling and Simulation of Workload Patterns in a Large-Scale Utility Cloud Abstract?Analysis, Modeling and Simulation of Workload Patterns in a Large-Scale Utility Cloud. Understanding the characteristics and patterns of < Final Year Projects > workloads within a Cloud computing environment is critical in order to improve resource management and operational conditions while Quality of…

  • ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds

    0 out of 5
    4,500

    ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds Abstract?ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds. The Success of cloud computing makes an increasing number of real-time applications such as signal processing and weather forecasting run in the cloud. Meanwhile, scheduling for real-time tasks is playing an essential role for a cloud provider…

  • ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds

    0 out of 5
    4,500

    ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds Abstract? The success of cloud computing makes an increasing number of real-time applications such as signal processing and weather forecasting run in the cloud. Meanwhile, scheduling for real-time tasks is playing an essential role for a cloud provider to maintain its quality of service and enhance…

  • Attribute Based Data Sharing Scheme Revisited in Cloud Computing

    0 out of 5

    Attribute Based Data Sharing Scheme Revisited in Cloud Computing Abstract?Ciphertext-policy attribute-based encryp-tion (CP-ABE) is a very promising encryption technique for secure data sharing in the context of cloud computing. Data owner is allowed to fully control the access policy associated with his data which to be shared. < final year projects > [numbers_sections number=”1″ title=”Including…

End of content

End of content