Unsupervised traffic classification using flow statistical properties and IP packet payload. The researchers have started looking for Internet traffic recognition techniques that are independent of `well known’ TCP or UDP port numbers or interpreting the contents of packet payloads. Newer approaches classify traffic by recognizing statistical patterns in externally observable attributes of the traffic (such…
Uplink Energy-Delay Trade-Off under Optimized Relay Placement in Cellular Networks Abstract? Relay nodes-enhanced architectures are deemed a viable solution to enhance coverage and capacity of nowadays cellular networks. Besides a number of desirable features, these architectures reduce the average distance between users and network nodes, thus allowing for battery savings for users transmitting on the…
Uplink Energy-Efficient Load Balancing Over Multipath Wireless Networks Abstract? The case of multi-interface mobile devices transmitting video traffic over multiple interfaces simultaneously (uplink). We examine three important issues. First, how to dynamically distribute traffic among each network interface such that the load is balanced. Second, how to minimize the mobile device?s power consumption. Third, how…
User Differentiated Verifiable File Search on the Cloud Abstract?Cloud storage security has been gaining research interest in recent years. Although considerable work has been conducted on verifying the integrity of the outsourced data in the cloud. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides…
User-Centric Energy Efficiency Maximization for Wireless Powered Communications Abstract? we consider wireless powered communication networks (WPCNs) where multiple users harvest energy from a dedicated power station and then communicate with an information receiving station in a time-division manner. Thereby, our goal is to maximize the weighted sum of the user energy efficiencies (WSUEEs). In contrast…
User-Defined Privacy Grid System for Continuous Location-Based Services Abstract? User-Defined Privacy Grid System for Continuous Location-Based Services. Location-based services < Final Year Projects 2016 > require users to continuously report their location to a potentially untrusted serverto obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques for…
User-Defined Privacy Grid System for Continuous Location-Based Services Abstract? User-Defined Privacy Grid System for Continuous Location-Based Services. Location-based services < Final Year Projects 2016 > require users to continuously report their location to a potentially untrusted server to obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques…
Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment Abstract? Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment. Infrastructure as a Service < Final Year Projects 2016 > IaaS clouds provide virtual machines(VMs) under a pay-per-use business model, which can be used to create a dynamically…
Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Abstract?Using Crowdsourcing to Provide QoS for Mobile Cloud Computing.Quality of cloud service QoS < Final Year Projects 2016 > is one of the crucial factors for the success of cloud providers in mobile cloud computing. Context-awareness is a popular method for automatic awareness of the mobile…
Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Abstract? Quality of cloud service (QoS) is one of the crucial factors for the success of cloud providers in mobile cloud computing. Context-awareness is a popular method for automatic awareness of the mobile environment and choosing the most suitable cloud provider. Lack of context information may…
Using Data Mining Techniques for Detecting Terror-Related Activities on the Web Abstract? Using Data Mining Techniques for Detecting Terror-Related Activities on the Web. An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior (?profile?) of terrorists by applying a data…
Using Sentimental Analysis in Prediction of Stock Market Investment Abstract?AbstractSentimental Analysis is one of the most popular technique which is widely been used in every industry. Extraction of sentiments from user?s comments is used in detecting the user view for a particular company. Sentimental Analysis can help in predicting the mood of people which affects…