Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System Abstract-The convergence of Internet of Things (IoT), cloud computing and wireless body-area networks (WBANs) has greatly promoted the industrialization of e-/m-healthcare (electronic-/mobile-healthcare). However, the further flourishing of e-/m-Healthcare still faces many challenges including information security and privacy preservation. To address these problems,…
Proactive spectrum handoff protocol for cognitive radio ad hoc network and analytical evaluation Abstract?Abstract Spectrum handoff in cognitive radio technology has been emerged as a new method for improving performance of the cognitive radio networks. The authors propose a proactive spectrum handoff protocol based on a single rendezvous (SRV) coordination scheme without common control channel….
Probabilistic Static Load-Balancing of Parallel Mining of Frequent Sequences Abstract? Frequent sequence mining is well known and well studied problem in datamining. The output of the algorithm is used in many other areas like bioinformatics, chemistry, and market basket analysis. Unfortunately, the frequent sequence mining is computationally quite expensive. In this paper, we present a…
Product Billing System Abstract-This software project is a traditional product billing system with some added functionality. Our main functionality is to View the product the details through the QR Code. After scanning the QR Code, in that only we can see the full product details. Customer can give the feedback for buying their product. After…
Profiling Online Social Behaviors for Compromised Account Detection Abstract?Account compromization is a serious threat to users of online social networks (OSNs). While relentless spammers exploit the established trust relationships between account owners < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File…
Protection of Big Data Privacy Abstract?In recent years, big data have become a hot research topic. The increasing amount of big data also increases the chance of breaching the privacy of individuals. Since big data require high computational power and large storage, distributed systems are used. As multiple parties are involved in these systems, the…
Protection of Big Data Privacy Abstract? big data have become a hot research topic. The increasing amount of big data also increases the chance of breaching the privacy of individuals. Since big data require high computational power and large storage, distributed systems are used. As multiple parties are involved in these systems, the risk of…
Protection of DFIG wind turbine using fuzzy logic control Abstract-In the last 15 years, Double Fed Induction Generator (DFIG) had been widely used as a wind turbine generator, due its various advantages especially low generation cost so it becomes the most important and promising sources of renewable energy. This work focuses on studying of using…
Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model Abstract– Authenticated Key Exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power and highly efficient networks like pervasive and mobile computing network…
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Shar ing on the Cloud Abstract– Online data sharing for increased productivity and efficiency is one of the primary requirements today for any organization. The advent of cloud computing has pushed the limits of sharing across geographical boundaries, and has enabled a multitude of…
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud Abstract-Online data sharing for increased productivity and efficiency is one of the primary requirements today for any organization. The advent of cloud computing has pushed the limits of sharing across geographical boundaries, and has enabled a multitude of users to…
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks Abstract? Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent disconnection or delay. This work proposes a provenance-based trust framework, namely PROVEST (PROVEnance-baSed Trust model) that aims to achieve accurate peer-to-peer trust assessment and maximize the…