Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management Abstract? Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management. Distributed mobility management DMM is a promising technology to address the mobile data traf?c explosion problem. Since the location information of mobile < Final Year Project 2016 > nodes (MNs)…
Timing Error Tolerance in Small Core Designs for SoC Applications Abstract? Timing errors are an increasing reliability concern in nanometer technology, high complexity and multi-voltage/frequency integrated circuits. A local error detection and correction technique is presented in this work that is based on a new bit flipping flip-flop. Whenever a timing error is detected, it…
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Abstract? TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage. Attribute-based Encryption (ABE) is regarded as a promising cryptographic conducting tool to guarantee data owners? direct control over their data in public cloud storage. The earlier…
To improve Blood Donation Process using Data Mining Techniques Abstract? To improve Blood Donation Process using Data Mining Techniques. Blood is the vital thing for human being because there is no alternative for replacing it. This makes it necessary for the presence of a system for predicting continuous behavior of healthy blood donors in blood…
To Increase the Data Confidentiality under Exposing of Secret Keys with revocable Access Abstract– In the first place, describe a new novel cryptography approaches based key management with data storage on cloud server.Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the attacker?s access to the cipher…
To Lie or t o Comply: Defending against FloodAttacks in Disruption Tolerant Networks Abstract? To Lie or t o Comply: Defending against FloodAttacks in Disruption Tolerant Networks. For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search…
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model Abstract? To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…
To Relay or Not to Relay: Learning Device-to-Device Relaying Strategies in Cellular Networks Abstract?We consider a cellular network where mobile transceiver devices that are owned by self-interested users are incentivized to cooperate with each other using tokens, which they exchange electronically to ?buy? and ?sell? downlink relay services, thereby increasing the network?s capacity compared to…
Top-k Similarity Join in Heterogeneous Information Networks Abstract? Top-k Similarity Join in Heterogeneous Information Networks. As a newly emerging network model, heterogeneous information networks < Final Year Projects 2016 > have received growing attention. Many data mining tasks have been explored in HINs, including clustering, classi?cation, and similarity search. Similarity join is a fundamental operation…
Topic Model for Graph Mining Abstract? Topic Model for Graph Mining. Graph mining has been a popular research area because of its numerous application scenarios. Many unstructured and structured data can be represented as graphs, such as, documents, chemical molecular structures, and images. However, an issue in relation to current research on graphs is that…
Topic-Sensitive Influencer Mining in Interest-Based Social Media Networks via Hypergraph Learning Abstract?Topic-Sensitive Influencer Mining in Interest-Based. Social Media Networks via Hypergraph Learning, Social media is emerging as a new mainstream means of interacting around online media. Social influence mining in social networks is therefore of critical importance in real-world applications such as friend suggestion and…