Showing 1717–1728 of 2014 results

  • Security and Privacy-Enhancing Multicloud Architectures

    Security and Privacy-Enhancing Multicloud Architectures

    0 out of 5
    4,500

    Security and Privacy-Enhancing Multicloud Architectures Abstract? Security and Privacy-Enhancing Multicloud Architectures. Security challenges are still among the biggest obstacles when considering the adoption of cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues, the cloud paradigm comes with…

  • Security as a Service Model for Cloud Environment

    Security as a Service Model for Cloud Environment

    0 out of 5
    4,500

    Security as a Service Model for Cloud Environment Abstract?Cloud computing is becoming increasingly important for provision of services and storage of data in the Internet. However there are several significant challenges in securing cloud infrastructures from different types of attacks. The focus of this paper is on the security services that a cloud provider can…

  • Security challenges in vehicular Cloud

    Security challenges in vehicular Cloud

    0 out of 5
    4,500

    Security challenges in vehicular Cloud   Abstract? In a series of recent papers, Prof. Olariu and his co-workers have promoted the vision of vehicular clouds (VCs), a nontrivial extension, along several dimensions, of conventional cloud computing. In a VC, underutilized vehicular resources including computing power, storage, and Internet connectivity can be shared between drivers or…

  • Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

    Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

    0 out of 5
    4,500

    Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Abstract?The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. In this paper, using recent advances in uncertain reasoning that originated from the artificial intelligence community, we…

  • Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning

    Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning

    0 out of 5
    4,500

    Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning Abstract?The distinctive features of mobile ad hoc networks< Final Year Projects 2016 > including dynamic topology and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. In this paper, using recent advances in uncertain reasoning that originated from the…

  • Security system based on Viola Jones Detection

    Security system based on Viola Jones Detection

    0 out of 5
    4,500

    Security system based on Viola Jones Detection   Abstract? ris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the irisemployed in automated border crossings, nationalID systems,etc.< Final Year Projects >This paper illustrates techniquesto improve performance of iris recognition system based onstationary images using NI LabVIEW(Vision…

  • SeDas: A Self-Destructing Data System Based on Active Storage Framework

    SeDas: A Self-Destructing Data System Based on Active Storage Framework

    0 out of 5
    4,500

    SeDas: A Self-Destructing Data System Based on Active Storage Framework Abstract? SeDas: A Self-Destructing Data System Based on Active Storage Framework. Personal data stored in the Cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data…

  • SeDaSC: Secure Data Sharing in Clouds

    SeDaSC: Secure Data Sharing in Clouds

    0 out of 5
    4,500

    SeDaSC: Secure Data Sharing in Clouds Abstract? SeDaSC: Secure Data Sharing in Clouds. Cloud storage is an application of clouds that liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. In case of group-shared data, the data face both cloud-specific and conventional insider threats. Secure data sharing among…

  • SeDaSC: Secure Data Sharing in Clouds

    SeDaSC: Secure Data Sharing in Clouds

    0 out of 5
    4,500

    SeDaSC: Secure Data Sharing in Clouds Abstract? SeDaSC: Secure Data Sharing in Clouds. Cloud storage is an application of clouds that liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. In case of group-shared data, the data face both cloud-speci?c and < Final Year Project 2016 > conventional…

  • Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud

    Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud

    0 out of 5
    4,500

    Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud. In cloud computing, data generated in electronic form are large in amount. To maintain this data efficiently, there is a necessity of data recovery services. To cater this, in this paper we propose a smart remote data backup algorithm, Seed Block Algorithm (SBA). The…

  • Segmentation of Intracranial Vessels and Aneurysmsin Phase Contrast Magnetic Resonance Angiography Using Multirange Filters and Local Variances

    Segmentation of Intracranial Vessels and Aneurysmsin Phase Contrast Magnetic Resonance Angiography Using Multirange Filters and Local Variances

    0 out of 5
    4,500

    Segmentation of Intracranial Vessels and Aneurysmsin Phase Contrast Magnetic Resonance Angiography Using Multirange Filters and Local Variances   Abstract? Segmentation of intensity varying and low-contrast structures is an extremely challenging and rewarding task. In computer-aided diagnosis of intracranial aneurysms, segmenting the high-intensity major vessels along with the attached low-contrast aneurysms is essential to the recognition…

  • Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks

    Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks

    0 out of 5
    4,500

    Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks Abstract? Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks. Robust brain magnetic resonance (MR) segmentation algorithms are critical to analyze tissues and diagnose tumor and edema in a quantitative way. In…

End of content

End of content