Detection and Prevention of Wormhole Attack Manet Abstract? The development in wireless technologies and the high availability of wireless equipment in everyday life have made infrastructure-less networks very popular. MANETs are becoming more and more common due to their ease of deployment. Unlike the wireless networks having a fixed infrastructure, a mobile ad hoc network…
Device-to-Device Communications for Enhancing Quality of Experience in Software Defined Multi-Tier LTE-A Networks Abstract?3GPP has been developing LTE-A standard to significantly enhance the performance of cellular networks by utilizing various radio access techniques to provide ubiquitous and seamless broadband access to a rich diversity of mobile connected devices, which usually demand high QoE in spite…
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks Abstract? Due to energy and bandwidth limitations of wireless sensor networks (WSNs), it is crucial that data provenance for these networks be as compact as possible. Even if lossy compression techniques are used for encoding provenance information, the size of the provenance increases with the number…
DiP-SVM : Distribution Preserving Kernel Support Vector Machine for Big Data Abstract-In the first place, affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, the WSNs have been broadly applied, such as target tracking and environment remote monitoring. However, data can…
Discovering Mobile Applications in Cellular Device-to-Device Communications: Hash Function and Bloom Filter-Based Approach Abstract? We propose a code-based discovery protocol for cellular device-to-device < Final Year Projects 2016 > D2D communications. To realize proximity based services such as mobile social networks and mobile marketing using D2D communications, each device should ?rst discover nearby devices, which…
Distributed Storage Design for Encrypted Personal Health Record Data Abstract? DSePHR is proposed in this work in order to manage the encrypted PHR data on a cloud storage. HBase and Hadoop are utilized in this work. The objective is to provide an API for any PHR system to upload/download the encrypted PHR data from a…
Diversifying Web Service Recommendation Results via Exploring Service Usage History Abstract? Diversifying Web Service Recommendation Results via Exploring Service Usage History. The last decade has witnessed a tremendous growth of Web services as a major technology for sharing data, computing resources, and programs on the Web.< Final Year Project 2016 > With the increasing adoption…
Diversifying Web Service Recommendation Results via Exploring Service Usage History Abstract? Diversifying Web Service Recommendation Results via Exploring Service Usage History. The last decade has witnessed a tremendous growth of Web services as a major technology for sharing data, computing resources, and programs on the Web. With the increasing adoption and presence of Web services,…
Diversifying Web Service Recommendation Results via Exploring Service Usage History Abstract? Diversifying Web Service Recommendation Results via Exploring Service Usage History. The last decade has witnessed a tremendous growth of Web services as a major technology for sharing data, computing resources, and programs on the Web. With the increasing adoption and presence of Web services,…
DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance Abstract-Centralized solutions for vehicular traffic re-routing to alleviate congestion suffer from two intrinsic problems: scalability, as the central server has to perform intensive computation and communication with the vehicles in real-time; and privacy, as the drivers have to share their location as well as the…
Division and Replication of Data in Cloud for Optimal Performance and Security – DROPS Abstract-Cloud storage is basically giving all the data to a third party to store it and to retrieve them whenever we wish. This compromises the security of the data. So high security measures are meant to be taken but, it should…
Dynamic and Public Auditing with Fair Arbitration for Cloud Data Abstract? Cloud users no longer physically possess their data, so how to ensure the integrity of their outsourced data becomes a challenging task. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database…