A Suitable Initialization Procedure for Speeding a Neural Network Job-Shop Scheduling Abstract? Artificial neural network models have been successfully applied to solve a job-shop scheduling problem (JSSP) known as a Nonpolynomial (NP-complete) constraint satisfaction problem. Our main contribution is an improvement of the algorithm proposed in the literature. It consists in using a procedure…
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing Abstract?Never before have data sharing been more convenient with the rapid development and wide adoption of cloud computing. However, how to ensure the cloud user?s data security is becoming the main obstacles that hinder cloud computing from extensive adoption. Proxy re-encryption serves as…
A Survey of Task Allocation and Load Balancing in Distributed Systems Abstract?In past decades, significant attention has been devoted to the task allocation and load balancing in distributed systems. Although there have been some related surveys about this subject, each of which only made a very preliminary review on the state of art of one…
A Synergetic Use of Bloom Filters for Error Detection and Correction Abstract? Bloom ?lters (BFs) provide a fast and ef?cient way to check whether a given element belongs to a set. The BFs are used in numerous applications, for example, in communications and networking. There is also ongoing research to extend and enhance BFs and…
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Abstract?A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggressive means, denial-of-service (DoS) attacks cause…
A System for Timely and Controlled Information Sharing in Emergency Situations Abstract? During natural disasters or emergency situations, an essential requirement for an effective emergency management is the information sharing.< Final Year Projects > In this paper, we present an access control model to enforce controlled information sharing in emergency situations. An in-depth analysis of…
A System to Filter Unwanted Messages from OSN User Walls Abstract? One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide little support to this requirement. <…
A T o p – r Feature Selection Algorithm for Microarray Gene Expression Data Abstract?Feature selection from microarray data has become an ever evolving area of research. Numerous techniques have widely been applied for extraction of genes which are expressed differentially in microarray data. Some of these comprise of studies related to fold-change approach, <...
A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks Abstract?Wireless sensor networks < Final Year Projects 2016 > WSNs are transitioning to real-world applications, where they face attacks already experienced by the Internet and wireless ad hoc networks. One such attack is that of denial-of-service (DOS), which we believe will only become more prevalent as…
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud Abstract?A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud. Big sensor data is prevalent in both industry and scientific research applications where the data is generated with high volume and velocity it is difficult to process using on-hand…
A Toolkit for Modeling and Simulation of Real-Time Virtual Machine Allocation in a Cloud Data Center Abstract?A Toolkit for Modeling and Simulation of Real-Time Virtual Machine Allocation in a Cloud Data Center. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution…
A Traffic Adaptive Multi-channel MAC Protocol with Dynamic Slot Allocation for WSNs Abstract?A Traffic Adaptive Multi-channel MAC Protocol with Dynamic Slot Allocation for WSNs. Using low duty-cycle is the most common technique to extend the system lifetime in WSNs. However, it also implies limited throughput and long delay and the penalty is even higher under…