Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Abstract?The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. In this paper, using recent advances in uncertain reasoning that originated from the artificial intelligence community, we…
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning Abstract?The distinctive features of mobile ad hoc networks< Final Year Projects 2016 > including dynamic topology and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. In this paper, using recent advances in uncertain reasoning that originated from the…
SeDaSC: Secure Data Sharing in Clouds Abstract? SeDaSC: Secure Data Sharing in Clouds. Cloud storage is an application of clouds that liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. In case of group-shared data, the data face both cloud-specific and conventional insider threats. Secure data sharing among…
SeDaSC: Secure Data Sharing in Clouds Abstract? SeDaSC: Secure Data Sharing in Clouds. Cloud storage is an application of clouds that liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. In case of group-shared data, the data face both cloud-speci?c and < Final Year Project 2016 > conventional…
Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks Abstract? Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks. Robust brain magnetic resonance (MR) segmentation algorithms are critical to analyze tissues and diagnose tumor and edema in a quantitative way. In…
Segmentation of Underwater Images Using Different Techniques Abstract? Segmentation of Underwater Images Using Different Techniques. This paper presents a method for the automatic creation of 2D mosaics of the sea floor, using video sequences acquired at different altitudes above the sea floor. The benefit of using different altitude sequences comes from the fact that higher…
Segmentation-Based Image Copy-Move Forgery Detection Scheme Abstract? Segmentation-Based Image Copy-Move Forgery Detection Scheme. A scheme to detect the copy-move forgery in an image, mainly by extracting the keypoints for comparison. The main difference to the traditional methods is that the proposed scheme first segments the test image into semantically independent patches prior to < Final…
SeLeCT: Self-Learning Classifier for Internet Traffic Abstract?Network visibility is a critical part of traffic engineering, network management, and security. The most popular current solutions – Deep Packet Inspection (DPI) and statistical classification, deeply rely on the availability of a training set. Besides the cumbersome need to regularly update the signatures, their visibility is limited to…
Self-Adaptive Learning PSO-Based Deadline Abstract?Public clouds provide Infrastructure as a Service (IaaS) to users who do not own sufficient compute resources. IaaS achieves the economy of scale by multiplexing, and therefore faces the challenge of scheduling tasks to meet the peak demand while preserving Quality-of-Service (QoS). Previous studies proposed proactive machine purchasing or cloud federation…
Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters Abstract? Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters. The MapReduce framework and its open source implementation Hadoop have become the defacto platform for scalable analysis on large data sets in recent years. One of the primary concerns in Hadoop is how to minimize the…
Semantic Link Network-Based Model for Organizing Multimedia Big Data Abstract?Semantic Link Network-Based Model for Organizing Multimedia Big Data. Recent research shows that multimedia resources in the wild are growing at a staggering rate. The rapid increase number of multimedia resources has brought an urgent need to < Final Year Projects > develop intelligent methods to…
Semantics Driven Approach for Knowledge Acquisition From EMRs Abstract?Semantics Driven Approach for Knowledge Acquisition From EMRs. Semantic computing technologies have matured to be applicable to many critical domains such as national security, life sciences, and health care. However, the key to their success is the availability of a rich domain knowledge base. The creation and…