An Adaptive System Based on Roadmap Profiling to Enhance Warning Message Dissemination in VANETs Abstract? In recent years, new applications, architectures, and technologies have been proposed for vehicular ad hoc networks (VANETs). Regarding traffic safety applications for VANETs, warning messages have to be quickly and smartly disseminated in order to reduce the required dissemination…
An Algorithm for Power Line Detection and Warning Based on a Millimeter-Wave Radar Video Abstract? Power-line-strike accident is a major safety threat for low-?ying aircrafts such as helicopters, thus an automatic warning system to power lines is highly desirable. In this paper we propose an algorithm for detecting power lines from radar videos from an…
An Analysis of Healthcare Monitoring Environment Using Elliptic Curve Cryptography Abstract-Health care monitoring is the one of popular streaming data application. Here we proposed to a novel methodology for mining frequent item sets through patient disease records. Here address the problem of multiple patient records and disease details are security based stored in cloud server…
An Attack-Resistant Trust Model based on Multidimensional trust Metrics in Underwater Acoustic Sensor Network Abstract? Underwater Acoustic Sensor Networks (UASNs) have been widely used in many applications where a variable number of sensor nodes collaborate with each other to perform monitoring tasks. A trust model plays an important role in realizing collaborations of sensor nodes….
An Automated Dynamic Offset for Network Selection in Heterogeneous Networks Abstract?Complementing traditional cellular networks with the option of integrated small cells and WiFi access points can be used to further boost the overall traffic capacity and service level. Small cells along with WiFi access points are projected to carry over 60 percent of all theglobal…
An Autonomic Approach to Risk-Aware Data Center Overbooking Abstract?An Autonomic Approach to Risk-Aware Data Center Overbooking. Elasticity is a key characteristic of cloud computing that increases the flexibility for cloud consumers, allowing them to adapt the amount of physical resources associated to their < Final Year Projects > services over time in an on-demand basis….
An Autonomic Approach toRisk-Aware Data Center Overbooking Abstract?An Autonomic Approach toRisk-Aware Data Center Overbooking. Elasticity is a key characteristic of cloud computing that increases the flexibility for cloud consumers, allowing them to adapt the amount of physical resources associated to their services over time in an on-demand basis. However, elasticity creates problems for cloud providers…
An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy Abstract-How to control the access of the huge amount of big data becomes a very challenging issue, especially when big data are stored in the cloud. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising encryption technique that enables end-users to encrypt their data under…
An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy Abstract? How to control the access of the huge amount of big data becomes a very challenging issue, especially when big data are stored in the cloud. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising encryption technique that enables end-users to encrypt their data…
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing Abstract? In cloud computing, data owners host their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, this new paradigm of data hosting service also introduces new security challenges,…
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Abstract? An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing. Ciphertext-policy attribute-based encryption (CPABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The shared data ?les generally have the characteristic of multilevel hierarchy, particularly…