Showing 313–324 of 860 results

  • Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

    Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

    0 out of 5
    5,500

    Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage Abstract? Cloud storage is an increasingly popular application of cloud computing, which can provide on-demand outsourcing data services for both organizations and individuals. However, users may not fully trust the cloud service providers (CSPs) in that it is difficult to determine whether the CSPs meet their legal…

  • Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

    Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

    0 out of 5
    5,500

    Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage Abstract? Cloud storage is an increasingly popular application of cloud computing, which can provide on-demand outsourcing data services for both organizations and individuals. However, users may not fully trust the cloud service providers (CSPs) in that it is difficult to determine whether the CSPs meet their legal…

  • DynamicMR: A Dynamic Slot Allocation Optimization Framework for MapReduce Clusters

    DynamicMR: A Dynamic Slot Allocation Optimization Framework for MapReduce Clusters

    0 out of 5
    4,500

    DynamicMR: A Dynamic Slot Allocation Optimization Framework for MapReduce Clusters Abstract?DynamicMR: A Dynamic Slot Allocation Optimization Framework for MapReduce Clusters. MapReduce is a popular computing paradigm for large-scale data processing in cloud computing. However, the slot-based MapReduce system (e.g., Hadoop MRv1) can suffer from poor performance due to its unoptimized resource allocation. To address it,…

  • DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors

    DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors

    0 out of 5
    4,500

    DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors Abstract? DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors. The functionality of modern multi-core processors is often driven by a given power budget that requires designers to evaluate different decision trade-offs, e.g.,to choose between many slow, power-efficient cores, or fewer faster, power-hungry cores, or a…

  • E-Learning

    E-Learning

    0 out of 5
    4,500

    E-Learning Abstract-E-Learning can be defined as ‘learning facilitated and supported through the use of information and communications technology’. It can cover a spectrum of activities from the use of technology to support learning as part of a ?blended? approach (a combination of traditional and e-learning approaches), to learning that is delivered entirely online. Whatever the…

  • E-Tool For Online Purchase

    E-Tool For Online Purchase

    0 out of 5
    5,500

    E-Tool For Online Purchase Abstract-Now a days, many android applications are available which provides many smart things to the users. Google?s Android Operating System in Mobile phones are still relatively new, however, Android Operating System has been progressing quite rapidly. Nowadays people are busy in switching between personal and business life. People need products immediately…

  • E-transport Management

    E-transport Management

    0 out of 5
    4,500

    E-transport Management Abstract-In employee transport management system is used to automate the process of allocating the bus to the particular driver and conductor. So that driver/conductor can know their bus as well as know their bus route and timing also. Admin can maintain all information regarding transport management. This System is very useful for the…

  • Economic and Energy Considerations for Resource Augmentation in Mobile Cloud Computing

    Economic and Energy Considerations for Resource Augmentation in Mobile Cloud Computing

    0 out of 5
    4,500

    Economic and Energy Considerations for Resource Augmentation in Mobile Cloud Computing Abstract?Economic and Energy Considerations for Resource Augmentation in Mobile Cloud Computing. We proposed to utilize a centralized broker-node to perform task scheduling for the resource augmentation of a large number of mobile devices. The task scheduler model focused on energy < Final Year Projects…

  • eDSA: Energy-Efficient Dynamic Spectrum Access Protocols for Cognitive Radio Networks

    eDSA: Energy-Efficient Dynamic Spectrum Access Protocols for Cognitive Radio Networks

    0 out of 5
    5,500

    eDSA: Energy-Efficient Dynamic Spectrum Access Protocols for Cognitive Radio Networks Abstract?In this paper we propose a class of energy-efficient dynamic spectrum access (DSA) protocols for secondary user (SU) communication over a single primary user (PU) channel. The proposed variants of DSA can be optimized with respect to different back-off strategies and SU packet lengths. <...

  • Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms

    Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms

    0 out of 5
    4,500

    Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms Abstract? The increasing threat of phishing attacks on mobile computing platforms. In fact, mobile phishing is particularly dangerous due to the hardware limitations of mobile devices and mobile user habits. In this paper, we did a comprehensive study on the security vulnerabilities caused by mobile…

  • Effective Features to Classify Big Data Using Social Internet of Things

    Effective Features to Classify Big Data Using Social Internet of Things

    0 out of 5
    4,500

    Effective Features to Classify Big Data Using Social Internet of Things Abstract-Social Internet of Things (SIoT) supports many novel applications and networking services for the IoT in a more powerful and productive way. In this paper, we have introduced a hierarchical framework for feature extraction in SIoT big data using map-reduced framework along with a…

  • Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures

    Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures

    0 out of 5
    5,500

    Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures Abstract?Rapid advances in wireless communication technologies have paved the way for a wide range of mobile devices to become increasingly ubiquitous and popular. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete…

End of content

End of content