Pattern Lock Intrusion Detection Scheme in Android Abstract-In this android application is based on application manager to manage the sensitive private application like (Facebook, what Sapp, twitter, etc.). This application is a collection of applications for manage the security and privacy of that sensitive application. This application has one password to sign all the application,…
Pattern lock using MMS Abstract?In this android application is based on application manager to manage the sensitive private application like (Facebook, what Sapp, twitter, etc.,). ? This application is a collection of applications for manage the security and privacy of that sensitive application.This application has one password to sign all the application, after sign out…
Pattern-based Topics for Document Modelling in Information Filtering Abstract? Many mature term-based or pattern-based approaches have been used in the field of information filtering to generate users? information needs from a collection of documents. A fundamental assumption for these approaches is that the documents in the collection are all about one topic. However, in reality…
iShuffle: Improving Hadoop Performance with Shuffle-on-Write Abstract-The project is an Android based application where users can get instant electricity bill and pay them. Hence the system is developed to automate the electricity bill calculation and payment for user convenience. The system would be having two logins admin and user login. Admin can view user account…
Payroll Management SystemS Abstract?Payroll system can be used to speed up the process of calculating pay, ensuring that payments are both accurate and on time. They save you the burden of learning and understanding complex payroll legislation. Trouble free payroll processing is a critical need of any business. Payroll software completes payroll calculations within a…
PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications Abstract? In vehicular networks, broadcast communications are critically important, as many safety-related applications rely on single-hop beacon messages broadcast to neighbor vehicles. However, it becomes a challenging problem to design a broadcast authentication scheme for secure vehicle-to-vehicle communications. Especially when a large number of beacons arrive in a short…
PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups Abstract? Third-party analysis on private records is becoming increasingly important due to the widespread data collection for various analysis purposes. However, the data in its original form often contains sensitive information about individuals, and its publication will severely breach their privacy. In this paper, we…
Performance Analysis of Mobile Data Offloading in Heterogeneous Networks Abstract? An unprecedented increase in the mobile data traffic volume has been recently reported due to the extensive use of smartphones, tablets and laptops. This is a major concern for mobile network operators, who are forced to often operate very close to their capacity limits. Recently,…
Performance Analysis of Mobile Data Offloading in Heterogeneous Networks Abstract? An unprecedented increase in the mobile data traffic volume has been recently reported due to the extensive use of smartphones, tablets and laptops. This is a major concern for mobile network operators, who are forced to often operate very close to (or even beyond) their…
Performance and Security Analyses of Onion-Based Anonymous Routing for Delay Tolerant Networks Abstract– Delay tolerant network (DTN) routing provides a communication primitive in intermittently disconnected networks, such as battlefield communications and human-contact networks. In these applications, the anonymity preserving mechanism, which hides the identities of communicating parties, plays an important role as a defense against…
Performance Comparison of Wavelet and Contourlet Frame Based Features for Improving Classification Accuracy in Remote Sensing Images Abstract?Abstract Conventional classification algorithms makes the use of only multispectral information in remote sensing image classification.Wavelet provides spatial and spectral characteristics of a pixel along with its neighbours and hence this can be utilized for an improved classification….
Performance Evaluation of the Single-Phase Split-Source Inverter Using an Alter native DC-AC Configuration Abstract-In the first place, investigates and evaluates the performance of a single-phase split-source inverter (SSI), where an alternative unidirectional dc-ac configuration is used. Such configuration is utilized in order to use two common-cathode diodes in a single-device instead of using two separate…