PROVEST: Provenance-based Trust Model for Delay Tolerant Networks Abstract? Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent disconnection or delay. This work proposes a provenance-based trust framework, namely PROVEST (PROVEnance-baSed Trust model) that aims to achieve accurate peer-to-peer trust assessment and maximize the…
Providing User Security Guarantees in Public Infrastructure Clouds Abstract-The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants ? insulated from the minutiae of hardware maintenance ? rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organizations…
Public Integrity Auditing for Dynamic Regenerating Code Based Cloud Storage Abstract?To protect cloud data against corruption, enabling data integrity checking along with error recovery becomes quite critical. Recently, regenerating code has caught researchers? at- tention due to low repair traffic while preserving fault tolerance. Existing integrity checking schemes for regenerating code storage only support static…
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation Abstract?The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes the secure remote data auditing a hot topic that appeared in the research literature. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code…
Automobile Spare Shop(Android App) Abstract-Outsourcing storage and computation to the cloud has become a common practice for businesses and individuals. As the cloud is semi-trusted or susceptible to attacks, many researches suggest that the outsourced data should be encrypted and then retrieved by using searchable symmetric encryption (SSE) schemes. Since the cloud is not fully…
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys Abstract?Uploading data streams to a resource-rich cloud server for inner product evaluation, an essential building block in many popular stream applications (e.g., statistical monitoring), is appealing to many companies and individuals. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete…
Pulmonary Lobe Segmentation With Probabilistic Segmentation of the Fissures and a Groupwise Fissure Prior Abstract– A fully automated, unsupervised lobe segmentation algorithm is presented based on a probabilistic segmentation of the fissures and the simultaneous construction of a population model of the fissures. A two-class probabilistic segmentation segments the lung into candidate fissure voxels and…
QoS Recommendation in Cloud Services Abstract– As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its…
QoS-Oriented Mode, Spectrum, and Power Allocation for D2D Communication Underlaying LTE-A Network Abstract?the problem of resource allocation for device-to-device (D2D) communication in a Third- Generation Partnership Project (3GPP) Long-Term Evolution Advanced (LTE-A) network. The users in the network can operate either in a traditional cellular mode, communicating with each other via the evolved NodeB (eNB),…
QR Code Authentication based Goods Delivery System Abstract– This application is for, order checking between delivery boy and the customer. If the customer order some goods in a particular company/ industry means, the order information such as customer name, address, amount, number of items to be purchased details will be sent to both customer as…
Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks Abstract– In the first place, addresses the problem of Access Point (AP) selection in large Wi-Fi networks. Unlike current solutions that rely on Received Signal Strength (RSS) to determine the best AP that could serve a wireless user?s request, we propose a novel…
Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases Abstract? Resource Description Framework (RDF) has been widely used in the SemanticWeb to describe resources and their relationships. The RDF graph is one of the most commonly used representations for RDF data. However, in many real applications such as the data extraction/integration, RDF graphs integrated from different…