Effective Key Management in Dynamic Wireless Sensor Networks Abstract? Wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traf?c ?ow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. In this paper, we propose…
Effficient Quality Analysis Of MRI Image Using Preprocessing Techniques Abstract?mage pre-processing techniques are used to improve the quality of an image before processing into an application. This uses a small neighborhood of a pixel in an input image to get a new brightness value in the output image. These preprocessing techniques are also called…
Efficient -means++ Approximation with MapReduce Abstract? Efficient -means++ Approximation with MapReduce. The important person is vital for information spreading efficiency in social networks, which has always been the hottest research field in recent years. Nowadays, with the increased < Final Year Projects > information spreading speed in our daily life such as cellphone or microblog,…
Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases Abstract? Mining high utility itemsets from a transactional database refers to the discovery of itemsets with high utility like profits. Although a number of relevant algorithms have been proposed in recent years, they incur the problem of producing a large number of candidate itemsets for…
Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Itemsets Abstract? Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Itemsets. Mining high utility itemsets (HUIs) from databases is an important data mining task, which refers to the discovery of itemsets with high utilities (e.g. high pro?ts). However, it…
Efficient Algorithms for Mining Top-K High Utility Itemsets Abstract?Efficient Algorithms for Mining Top-K High Utility Itemsets. High utility itemsets HUIs < Final Year Projects 2016 > mining is an emerging topic in data mining, which refers to discovering all itemsets having a utility meeting a user-specified minimum utility threshold min_util. However, setting min_util appropriately is…
Efficient and Consistent Path Loss Model for Mobile Network Simulation Abstract?The accuracy of wireless network packet simulation critically depends on the quality of wireless channel models. Path loss is the stationary component of the channel model affected by the shadowing in the environment. Existing path loss models are inaccurate, require excessive measurement or computational overhead,…
Efficient and Effective Duplicate Detection in Hierarchical Data Abstract? Efficient and Effective Duplicate Detection in Hierarchical Data. Although there is a long line of work on identifying duplicates in relational data, only a few solutions focus on duplicate detection in more complex hierarchical structures, like XML data. In this paper, we present a novel method…
Efficient and Scalable Public Key Infrastructure for Wireless Sensor Networks Abstract?Ensuring security is essential in wireless sensor networks (WSNs) since a variety of applications of WSNs, includ? ing military, medical and industrial sectors, require several kinds of security services such as confidentiality, authentication, and integrity. However, ensuring security is not trivial in WSNs be? cause…
Efficient Authentication for Mobile and Pervasive Computing Abstract? Efficient Authentication for Mobile and Pervasive Computing. With today’s technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In…
Efficient Construction for Region Incrementing Visual Cryptography Abstract?A region incrementing visual cryptography scheme (RIVCS) deals with the sharing of an image consisting of multiple regions with different secrecy levels, which can be incrementally revealed as the number of shares increases. < Final Year Project >The encoding basis matrices of RIVCS for an image containing three…
Efficient Cryptographic Algorithm For Mobile Handheld Devices With Minimum Energy Consumption Abstract?Efficient Cryptographic Algorithm For Mobile Handheld Devices With Minimum Energy Consumption. Due to the continuous advancement in technology, mobile devices are playing important role in everyones day to day life. Everyone is moving < Final Year Projects > towards wireless mobile systems, but security…