Showing 433–444 of 1911 results

  • Placeholder

    Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

    0 out of 5
    4,500

    Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Abstract?With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving. However, some data might be sensitive that the data owner does not want to…

  • Placeholder

    Building Optimized Web Browser Using Cache Services In Cloud Computing

    0 out of 5
    4,500

    Building Optimized Web Browser Using Cache Services In Cloud Computing Abstract?Security has become a major concern for mobile devices when mobile users browsing malicious websites. Existed security solutions may rely on human factors to achieve a good result against phishing websites and SSL Strip-based Man-In-The-Middle (MITM) attack. < Final Year Project > This paper presents…

  • Bulk SMS

    0 out of 5
    3,500

    Bulk SMS Abstract? Bulk SMS System Project, The University of Wolverhampton serves a region of considerable social, economic and educational diversity and disadvantage in the UK. The University is aware of the potential of mobile learning, teaching and administration in addressing the needs of its students and it has national Centre of Excellence (CETL) status…

  • BURSE: A Bursty andSelf-Similar Workload Generator for Cloud Computing

    0 out of 5
    4,500

    BURSE: A Bursty andSelf-Similar Workload Generator for Cloud Computing Abstract? BURSE: A Bursty andSelf-Similar Workload Generator for Cloud Computing. As two of the most important characteristics of workloads, burstiness and self-similarity are gaining more and more attention. Workload generation, which is a key technique for performance analysis and simulations, has also attracted an increasing interest…

  • By-Passing Infected Areas in Wireless Sensor Networks Using BPR

    0 out of 5
    4,500

    By-Passing Infected Areas in Wireless Sensor Networks Using BPR Abstract? By-Passing Infected Areas in Wireless Sensor Networks Using BPR. Abnormalities in sensed data streams indicate the spread of malicious attacks, hardware failure and software corruption among the different nodes in a wireless sensor network. These factors of node infection can affect generated and incoming data…

  • Byzantine failiure using control zones

    0 out of 5
    4,500

    Byzantine failiure using control zones Abstract?Byzantine failiure using control zones.We consider the problem of reliably broadcasting messages in a network where some nodes are likely to fail. We consider the most general failure model: the Byzantine model, where the failing nodes have an arbitrary behavior, and may actively try to destabilize the network. We focus…

  • CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

    0 out of 5
    4,500

    CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Abstract? Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. < Final Year Project > Unfortunately, it also…

  • Placeholder

    CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

    0 out of 5
    4,500

    CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Abstract? CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, < Final Year Projects > has been considered as a revolutionary approach to improving the quality of healthcare service while…

  • Campus automation

    0 out of 5
    3,500

    Campus automation Abstract?Campus automation With the development of digital campus in university, many new requirements to Office Automation (OA) system are put forward. Design of a new OA system based on modern digital campus platform was presented in this paper. The key points between digital campus platform and application system integration technology were discussed in…

  • Placeholder

    Cartoon-Texture Image Decomposition Using Blockwise Low-Rank Texture Characterization

    0 out of 5
    4,500

    Cartoon-Texture Image Decomposition Using Blockwise Low-Rank Texture Characterization Abstract?Cartoon-Texture Image Decomposition Using Blockwise Low-Rank Texture Characterization. Using a novel characterization of texture, we propose an image decomposition technique that can effectively decomposes an image into its cartoon and texture components. The characterization rests on our observation that the texture component enjoys a blockwise low-rank nature…

  • Placeholder

    cashing in on cloud cache Service

    0 out of 5
    4,500

    cashing in on cloud cache Service Abstract? Over the past decades, caching has become the key technology used for bridging the performance gap across memory hierarchies via temporal or spatial localities; in particular, the effect is prominent in disk storage systems. Applications that involve heavy I/O activities, which are common in the cloud, probably benefit…

  • Placeholder

    CCBKE- Session key negotiation for fast and secure scheduling of scientific applications in cloud computing

    0 out of 5
    4,500

    CCBKE- Session key negotiation for fast and secure scheduling of scientific applications in cloud computing Abstract?Instead of purchasing and maintaining their own computing infrastructure, scientists can now run data-intensive scientific applications in cloud computing environment by facilitating its vast storage and computation capabilities.< Final Year Project > During the scheduling of such scientific applications for…

End of content

End of content