Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks Abstract? Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks. Special designs are needed for cryptographic schemes in wireless sensor networks < Final Year Projects 2016 > WSNs. This is because sensor nodes are limited in memory storage and computational power. In 1992, Blundo…
Preserving and Prolonging Students Information in College Using Android Application Abstract? Student management system is to create an application that can provide query management system through android mobile phones. Student query management system android application tracks all the difficulties of a student from the day one to the end of his course which can be…
Preserving Clinical Decision Support System using Gaussian Kernel based Classi?cation Abstract? Preserving Clinical Decision Support System using Gaussian Kernel based Classi?cation. A clinical decision support system forms a critical capability to link health observations with health knowledge to influence choices by clinicians for improved healthcare. Recent trends toward remote outsourcing can be exploited to provide…
Preserving Location Privacy in Geosocial Applications Abstract?Preserving Location Privacy in Geosocial Applications. In geosocial applications, such as Foursquare, millions of people interact with their surroundings through their friends and their recommendations. Without adequate privacy protection, however, these systems can be easily misused, for example, to track users or target them for home invasion. In this…
Preventing Attack on Voting System Using Multi-Level Password Authentication Abstract-Voting system Using Multi level Password aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures…
Preventing DDoS Attacks by Identifier-Locator Separation.Identifier/locator separation is a promising solution to the current Internet scaling problems. In this article, we argue that identifier/location separation can also help prevent distributed denial-of-service (DDoS) attacks. We discuss an identifier-to-locator mapping approach and explain how the approach makes it difficult for attackers to control botnets. < Final Year...
Preventing Private Information Inference Attacks on Social Networks Abstract? Preventing Private Information Inference Attacks on Social Networks.Online social networks, such as Facebook, are increasingly utilized by many people. These networks allow users to publish details about themselves and to connect to their friends. Some of the information revealed inside these networks is meant to be…
Price competition in an oligopoly Market with Multiple IaaS Cloud providers Abstract? As an increasing number of infrastructure-as-a-service (IaaS) cloud providers start to provide cloud computing services, they form a competition market to compete for users of these services. Due to different resource capacities and service workloads, users may observe different finishing times for…
Primary User-aware Optimal Discovery Routing for Cognitive Radio Networks Abstract-Routing protocols in multi-hop cognitive radio networks (CRNs) can be classified into two main categories: local and global routing. Local routing protocols aim at decreasing the overhead of the routing process while exploring the route by choosing, in a greedy manner, one of the direct neighbors….
Prime Health Centre Abstract-This Health Care Management application will be like in an online Healthcare Management service provider with easy to use customizable options. The application is accessible from anywhere by all employees or staff of the hospital in private or at desktops or tablets etc. it will basically lessen the manual work and improves…
Principal Component Analysis for Hyperspectral Image Classification Abstract? we have applied supervised probabilistic principal component analysis (SPPCA) and semi-supervised probabilistic principal component analysis (S2PPCA) for feature extraction in hyperspectral remote sensing imagery.< Final Year Projects > The two models are all based on probabilistic principal component analysis (PPCA) using EM learning algorithm. SPPCA only…
Priority-Based Consolidation of Parallel Workloads in the Cloud Abstract? Priority-Based Consolidation of Parallel Workloads in the Cloud. The cloud computing paradigm is attracting an increased number of complex applications to run in remote data centers. Many complex applications require parallel processing capabilities. Parallel applications of certain nature often show a decreasing utilization of CPU resources…