A minimum enclosing ball-based support vector machine approach for detection of phishing websites Abstract?a novel approach based on minimum enclosing ball support vector machine < Final Year Projects 2016 > to phishing Website detection is proposed, which aims at achieving high speed and high accuracy for detecting phishing Website. In order to enhance the integrity…
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing Abstract?In energy harvesting wireless sensor networks (EH-WSNs), maximizing the data collection throughput is one of the most challenging issues. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…
[vc_row][vc_column][vc_column_text] A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing Abstract? A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing. Cloud computing is an Internet-based computing pattern through which shared resources are provided to devices on-demand. Its an emerging but promising paradigm to integrating mobile devices into cloud computing,…
A New Algorithm for Inferring User Search Goals with Feedback Sessions Abstract?For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search goals can be very useful in improving search engine relevance and user experience. In this paper,…
A New Algorithm for Inferring User Search Goals with Feedback Sessions.For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search goals can be very useful in improving search engine relevance and user experience. In this paper, we…
A New Methodology for Mining Frequent Itemsets on Temporal Data Abstract-Temporal data contain time-stamping information that affects the results of data mining. Traditional techniques for finding frequent itemsets assume that datasets are static and the induced rules are relevant across the entire dataset. However, this is not the case when data is temporal. In this…
A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast Abstract? A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast. Addressing key management in mobile multicast communication is currently a booming topic due to the convergence of wireless and mobile technologies. With the proliferation of multiple group based services that…
A Novel and Lightweight System to Secure Wireless Medical Sensor Networks Abstract? A Novel and Lightweight System to Secure Wireless Medical Sensor Networks. Wireless medical sensor networks (MSNs) are a key enabling technology in e-healthcare that allows the data of a patient’s vital body parameters to be collected by the wearable or implantable biosensors. However,…
A novel approach to generate MCQs from domain ontology: Considering DL semantics and open-world assumption Abstract? Ontologies are structures, used for knowledge representation, which model domain knowledge in the form of concepts, roles, instances and their relationships. This knowledge can be exploited by an assessment system in the form of multiple choice questions (MCQs). The…
A Novel Burst-based Text Representation Model for Scalable Event Detection Abstract? A Novel Burst-based Text Representation Model for Scalable Event Detection. Traditional Clustering is a powerful technique for revealing the “hot” topics among documents. However, it’s hard to discover the new type events coming out gradually. In this paper, we propose a novel model…
A Novel Continuous Blood Pressure Estimation Approach Based on Data M ining Techniques Abstract-Continuous blood pressure (BP) estimation using pulse transit time (PTT) is a promising method for unobtrusive BP measurement. However, the accuracy of this approach must be improved for it to be viable for a wide range of applications. This study proposes a…