Showing 25–36 of 79 results

  • Dual-image-based reversible data hiding method using center folding strategy

    Dual-image-based reversible data hiding method using center folding strategy

    0 out of 5
    4,500

    Dual-image-based reversible data hiding method using center folding strategy Abstract? Steganography is the art of hiding secrect information such as image, audio and video. The purpose of Steganography is to conceal the existence of the secret information in any given medium. A third order Debauchies? wavelet and five level decomposition is utilized to segregate the…

  • Dynamic and Fault-Tolerant Clustering for Scientific Workflows

    Dynamic and Fault-Tolerant Clustering for Scientific Workflows

    0 out of 5
    5,500

    Dynamic and Fault-Tolerant Clustering for Scientific Workflows Abstract?Task clustering has proven to be an effective method to reduce execution overhead and to improve the computational granularity of scientific workflow tasks executing on distributed resources. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram…

  • EAACK?A Secure Intrusion-Detection System for MANETs

    EAACK?A Secure Intrusion-Detection System for MANETs

    0 out of 5
    4,500

    EAACK?A Secure Intrusion-Detection System for MANETs Abstract? EAACK?A Secure Intrusion-Detection System for MANETs. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On…

  • Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation

    Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation

    0 out of 5
    4,500

    iShuffle: Improving Hadoop Performance with Shuffle-on-Write Abstract– Many data-driven personalized services require that private data of users is scored against a trained machine learning model. In this paper we propose a novel protocol for privacypreserving classification of decision trees, a popular machine learning model in these scenarios. Our solutions is composed out of building blocks,…

  • Encryption for High Efficiency Video Coding with Video Adaptation Capabilities

    Encryption for High Efficiency Video Coding with Video Adaptation Capabilities

    0 out of 5
    4,500

    Encryption for High Efficiency Video Coding with Video Adaptation Capabilities   Abstract? Video encryption techniques enable applications like digital rights management and video scrambling. Applying encryption on the entire video stream can be computationally costly and prevents advanced video modifications by an untrusted middlebox in the network, like splicing, quality monitoring, watermarking, and transcoding.< Final…

  • Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud

    Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud

    0 out of 5
    4,500

    Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud Abstract?Despite the advances in hardware for hand-held mobile devices, resource-intensive applications < Final Year Projects 2016 > e.g., video and image storage and processing or map-reduce type still remain off bounds since they require large computation and storage capabilities. Recent research has attempted to address these…

  • Enhancing Security and Privacy for Identity-based  Batch Verification Scheme in VANET

    Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET

    0 out of 5
    4,500

    Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET Abstract? Vehicular ad hoc network (VANET) can significantly improve the traffic safety and efficiency. The basic idea is to allow vehicles to send traffic information to roadside units (RSUs) or other vehicles. Vehicles have to be prevented from some attacks on their privacy and…

  • Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

    Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

    0 out of 5
    4,500

    Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems Abstract-Data integrity, a core security issue in reliable cloud storage, has received much attention. Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced data without downloading the data. A key research challenge associated with existing designs of data auditing protocols…

  • Human Effects of Enhanced Privacy M anagement Models

    Human Effects of Enhanced Privacy M anagement Models

    0 out of 5
    4,500

    Human Effects of Enhanced Privacy M anagement Models Abstract?Human Effects of Enhanced Privacy M anagement Models. We enhance existing and introduce new social network privacy management models and we measure their human effects. First, < Final Year Projects > we introduce a mechanism using proven clustering techniques that assists users in grouping their friends for…

  • Improving security and efficiency for encrypted data sharing in online social networks

    Improving security and efficiency for encrypted data sharing in online social networks

    0 out of 5
    4,500

    Improving security and efficiency for encrypted data sharing in online social networks Abstract?Improving security and efficiency for encrypted data sharing in online social networks. Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this…

  • Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

    Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

    0 out of 5
    4,500

    Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks Abstract? Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks. To achieve secure communications in wireless sen-sor networks (WSNs), sensor nodes < Final Year Projects 2016 > SNs must establish secret shared keys with neighboring nodes. Moreover, those keys must be updated…

  • Malware Clearance for Secure Commitment of OS-Level Virtual Machines

    Malware Clearance for Secure Commitment of OS-Level Virtual Machines

    0 out of 5
    4,500

    Malware Clearance for Secure Commitment of OS-Level Virtual Machines Abstract? Malware Clearance for Secure Commitment of OS-Level Virtual Machines. A virtual machine(VM) can be simply created upon use and disposed upon the completion of the tasks or the detection of error. The disadvantage of this approach is that if there is no malicious activity, the…

End of content

End of content