Showing 121–132 of 1348 results

  • A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

    0 out of 5
    4,500

    A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces…

  • A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

    0 out of 5
    4,500

    A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Abstract? A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Base Paper Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…

  • A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation

    0 out of 5
    4,500

    A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Abstract? A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.a secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will…

  • A secure remote user mutual authentication scheme using smart cards

    0 out of 5
    4,500

    A secure remote user mutual authentication scheme using smart cards Abstract? Authentication thwarts unauthorised users from accessing resources in insecure network environments. Password authentication based on smart cards is one of the simplest and most ef?cient authentication methods and is commonly deployed to authenticate the legitimacy of remote users. Based on cryptographic techniques, several password…

  • A Secured Biometric Protocol Using IRIS codes

    0 out of 5
    4,500

    A Secured Biometric Protocol Using IRIS codes   Abstract? A Secured Biometric Protocol Using IRIS codes Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice…

  • A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility

    0 out of 5
    4,500

    A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility with Pairing-Based Cryptography Abstract-Nowadays, telemedicine is an emerging healthcare service where the healthcare professionals can diagnose, evaluate,and treat a patient using telecommunication technology. To diagnose and evaluate a patient, the healthcare professionals need to access…

  • A Security Modeling Approach forWeb-Service-based Business Processes

    0 out of 5
    4,500

    A Security Modeling Approach forWeb-Service-based Business Processes. Several reports indicate that the highest business priorities include: business improvement, security, and IT management. The importance of security and risk management is gaining that even government statements in some cases have imposed the inclusion of security and risk management within business management. Risk assessment has become an…

  • A Selective Encryption Method To Ensure Confidentiality For Big Sensing Data Streams

    0 out of 5
    4,500

    A Selective Encryption Method To Ensure Confidentiality For Big Sensing Data Streams Abstract-Privacy has become a considerable issue when the applications of big data are dramatically growing in cloud computing. The benefits of the implementation for these emerging technologies have improved or changed service models and improve application performances in various perspectives. However, the remarkably…

  • A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection

    0 out of 5
    4,500

    A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection Abstract? A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection. Some authors have approached the instance selection problem from a meta-learning perspective. In their work, they try to ?nd relationships between the performance of some methods from this ?eld and…

  • A Similarity Measure for Text Classification and Clustering

    0 out of 5
    4,500

    A Similarity Measure for Text Classification and Clustering Abstract?A Similarity Measure for Text Classification and Clustering. Measuring the similarity between documents is an important operation in the text processing field. In this paper, a new similarity measure is proposed. To compute the similarity between two documents with respect to a feature, < Final Year Projects...

  • A Similarity-Based Learning Algorithm Using Distance Transformation

    0 out of 5
    4,500

    A Similarity-Based Learning Algorithm Using Distance Transformation Abstract? Numerous theories and algorithms have been developed to solve vectorial data learning problems by searching for the hypothesis that best ?ts the observed training sample. However, many real-world applications involve samples that are not described as feature vectors, but as (dis)similarity data. Converting vectorial data into <...

  • Placeholder

    A Space-Bounded Anytime Algorithm for the Multiple Longest Common Subsequence Problem

    0 out of 5
    4,500

    A Space-Bounded Anytime Algorithm for the Multiple Longest Common Subsequence Problem Abstract?A Space-Bounded Anytime Algorithm for the Multiple Longest Common Subsequence Problem. The multiple longest common subsequence (MLCS) problem, related to the identification of sequence similarity, is an important problem in many fields. As an NP-hard problem, its exact algorithms have difficulty in handling large-scale…

End of content

End of content