Showing 1249–1260 of 1330 results

  • Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data

    0 out of 5
    4,500

    Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data Abstract– Frequent itemset mining, which is the essential operation in association rule mining, is one of the most widely used data mining techniques on massive datasets nowadays. With the dramatic increase on the scale of datasets collected and stored with cloud services in recent years,…

  • Towards Achieving Data Security with the Cloud Computing Adoption Framework

    0 out of 5
    5,500

    Towards Achieving Data Security with the Cloud Computing Adoption Framework Abstract? Offering real-time data security for petabytes of data is important for cloud computing. A recent survey on cloud security states that the security of users? data has the highest priority as well as concern. We believe this can only be able to achieve with…

  • Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

    0 out of 5
    5,500

    Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service Abstract?Collection and analysis of various logs (e.g., process logs, network logs) are fundamental activities in computer forensics. Ensuring the security of the activity logs is therefore crucial to ensure reliable forensics investigations. However, because of the black-box nature of clouds and the volatility and co-mingling of cloud…

  • Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks

    0 out of 5
    5,500

    Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks Abstract? To design a distributed movement strategy for mobile collectors, which can be either physical mobile agents or query/collector packets periodically launched by the sink, to achieve successful data gathering in wireless sensor networks. Formulating the problem as general random walks on a…

  • Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment

    0 out of 5
    5,500

    Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment Abstract ? Recently, security issues are obstructing the development and using of cloud computing services. Authentication plays an important role in the cloud security, and numerous concerns have been raised to prevent an unauthorized users to access the entities? resources (sender and receiver) within…

  • Towards Encrypted Cloud Media Center with Secure Deduplication

    0 out of 5
    5,500

    Towards Encrypted Cloud Media Center with Secure Deduplication Abstract?The explosive growth of multimedia contents, especially videos, is pushing forward the paradigm of cloud-based media hosting today. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons…

  • Towards Long-View Computing Load Balancing in Cluster Storage Systems

    0 out of 5
    4,500

    Towards Long-View Computing Load Balancing in Cluster Storage Systems Abstract– In large-scale computing clusters, when the server storing a task?s requested data does not have sufficient computing capacity for the task, current job schedulers either schedule the task to the closest server and transmit to it the requested data, or let the task wait until…

  • Towards Pricing for Sensor-Cloud

    0 out of 5
    4,500

    Towards Pricing for Sensor-Cloud Abstract-Motivated by complementing the ubiquitous wireless sensor networks (WSNs) and powerful cloud computing (CC), a lot of attention from both industry and academia has been drawn to Sensor-Cloud (SC). However, SC pricing is barely investigated. Towards pricing for SC, this paper 1) introduces five SC Pricing Models (SCPMs) first. Specifically, to…

  • Towards Privacy-preserving and Practical Image-centric Social Discovery

    0 out of 5
    5,500

    Towards Privacy-preserving and Practical Image-centric Social Discovery Abstract? Images are becoming one of the key enablers of user connectivity in social media applications. Many of them are directly exploring image content to suggest new friends with similar interests. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete…

  • Towards Secure Data Distribution Systems in Mobile Cloud Computing

    0 out of 5
    4,500

    Towards Secure Data Distribution Systems in Mobile Cloud Computing Abstract– In the first place, cloud computing is though the electronic technologies have undergone fast developments in recent years, mobile devices such as smartphones are still comparatively weak in contrast to desktops in terms of computational capability, storage etc, and are not able to meet the…

  • Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs

    0 out of 5
    4,500

    Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs Abstract-In the first place, address the problem of preventing the inference of contextual information in event-driven wireless sensor networks (WSNs). The problem is considered under a global eavesdropper who analyzes low-level RF transmission attributes, such as the number of transmitted packets, inter-packet times, and traffic…

  • Transformer-Less Unified Power-Flow Controller Using the Cascade Multilevel Inverter

    0 out of 5
    5,500

    Transformer-Less Unified Power-Flow Controller Using the Cascade Multilevel Inverter Abstract?The conventional unified power-flow controller (UPFC) that consists of two back-to-back inverters requires bulky and often complicated zigzag transformers for isolation and reaching high voltage. < final year projects > View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides…

End of content

End of content