Showing 1153–1164 of 1348 results

  • Security challenges in vehicular Cloud

    0 out of 5
    4,500

    Security challenges in vehicular Cloud   Abstract? In a series of recent papers, Prof. Olariu and his co-workers have promoted the vision of vehicular clouds (VCs), a nontrivial extension, along several dimensions, of conventional cloud computing. In a VC, underutilized vehicular resources including computing power, storage, and Internet connectivity can be shared between drivers or…

  • Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

    0 out of 5
    4,500

    Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Abstract?The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. In this paper, using recent advances in uncertain reasoning that originated from the artificial intelligence community, we…

  • Security-Aware Resource Allocation for Mobile Social Big Data: A Matching-Coalitional Game Solution

    0 out of 5
    4,500

    Security-Aware Resource Allocation for Mobile Social Big Data: A Matching-Coalitional Game Solution Abstract-In the first place, As both the scale of mobile networks and the population of mobile users keep increasing equally important, the applications of mobile social big data have emerged where mobile social users can use their mobile devices to exchange and share…

  • Security, Privacy, and Access Control in Information-Centric Networking: A Survey

    0 out of 5
    4,500

    Security, Privacy, and Access Control in Information-Centric Networking: A Survey Abstract-Information-Centric Networking (ICN) replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet and mobile ad hoc networks) with an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents? origin. Content and client security, provenance, and identity privacy are…

  • SeDas: A Self-Destructing Data System Based on Active Storage Framework

    0 out of 5
    4,500

    SeDas: A Self-Destructing Data System Based on Active Storage Framework Abstract? SeDas: A Self-Destructing Data System Based on Active Storage Framework. Personal data stored in the Cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data…

  • SeDaSC: Secure Data Sharing in Clouds

    0 out of 5
    4,500

    SeDaSC: Secure Data Sharing in Clouds Abstract? SeDaSC: Secure Data Sharing in Clouds. Cloud storage is an application of clouds that liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. In case of group-shared data, the data face both cloud-speci?c and < Final Year Project 2016 > conventional…

  • SEDEX: Scalable Entity Preserving Data Exchange

    0 out of 5
    5,500

    SEDEX: Scalable Entity Preserving Data Exchange Abstract? Data exchange is the process of generating an instance of a target schema from an instance of a source schema such that source data is reflected in the target. Generally, data exchange is performed using schema mapping, representing high level relations between source and target schemas. < final...

  • Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud

    0 out of 5
    4,500

    Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud. In cloud computing, data generated in electronic form are large in amount. To maintain this data efficiently, there is a necessity of data recovery services. To cater this, in this paper we propose a smart remote data backup algorithm, Seed Block Algorithm (SBA). The…

  • SeLeCT: Self-Learning Classifier for Internet Traffic

    0 out of 5
    4,500

    SeLeCT: Self-Learning Classifier for Internet Traffic Abstract?Network visibility is a critical part of traffic engineering, network management, and security. The most popular current solutions – Deep Packet Inspection (DPI) and statistical classification, deeply rely on the availability of a training set. Besides the cumbersome need to regularly update the signatures, their visibility is limited to…

  • Self-Adaptive Learning PSO-Based Deadline

    0 out of 5
    4,500

    Self-Adaptive Learning PSO-Based Deadline Abstract?Public clouds provide Infrastructure as a Service (IaaS) to users who do not own sufficient compute resources. IaaS achieves the economy of scale by multiplexing, and therefore faces the challenge of scheduling tasks to meet the peak demand while preserving Quality-of-Service (QoS). Previous studies proposed proactive machine purchasing or cloud federation…

  • Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks

    0 out of 5
    4,500

    Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks Abstract?Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…

  • Semantic Link Network-Based Model for Organizing Multimedia Big Data

    0 out of 5
    4,500

    Semantic Link Network-Based Model for Organizing Multimedia Big Data Abstract?Semantic Link Network-Based Model for Organizing Multimedia Big Data. Recent research shows that multimedia resources in the wild are growing at a staggering rate. The rapid increase number of multimedia resources has brought an urgent need to < Final Year Projects > develop intelligent methods to…

End of content

End of content