A robust reputation management mechanism in the federated cloud Abstract-In the Infrastructure as a Service (IaaS) paradigm of cloud computing, computational resources are available for rent.Although it offers a cost efficient solution to virtual network requirements, low trust on the rented computational resources prevents users from using it. To reduce the cost, computational resources are…
A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments Abstract?Approximations of a concept by a variable precision rough-set model (VPRS) usually vary under a dynamic information system environment. It is thus effective to carry out incremental updating approximations by utilizing previous data structures.< Final Year Project > This paper focuses on a new…
A Scalable and Modular Architecture for High-Performance Packet Classification Abstract? A Scalable and Modular Architecture for High-Performance Packet Classification. Packet classification is widely used as a core function for various applications in network infrastructure. With increasing demands in throughput, performing wire-speed packet classification has become challenging. Also the performance of today’s packet classification solutions depends…
A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Abstract? A Scalable Server Architecture for Mobile Presence Services in Social Network Applications. Social network applications are becoming increasingly popular on mobile devices. A mobile presence service is an essential component of a social network application because it maintains each mobile user’s…
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization using MapReduce on Cloud Abstract? A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization using MapReduce on Cloud. A large number of cloud services require users to share private data like electronic health records for data analysis or mining, bringing privacy concerns. Anonymizing data sets via…
A SDN-based QoS Guaranteed Technique for Cloud Applications Abstract– Due to the centralized control, network-wide monitoring and flow-level scheduling of Software-Defined-Networking (SDN), it can be utilized to achieve Quality of Service (QoS) for cloud applications and services, such as voice over IP, video conference and online games, etc. However, most existing approaches stay at the…
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability Abstract? A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An…
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data Abstract? Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements,…
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Abstract? Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements,…
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks Abstract-Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, the WSNs have been broadly applied, such as target tracking and environment remote monitoring. However, data can be easily compromised…
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks Abstract?Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks research. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…
A Secure and Privacy-Preserving Opportunistic Computing for healthcare Abstract? the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges…