ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH

7 years ago

ABSTRACT: In mobile cloud computing, a fundamental application is to outsource the mobile data to external cloud servers for scalable…

EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval

7 years ago

Abstract—Graph-based ranking models have been widely applied in information retrieval area. In this paper, we focus on a well known…

Effective Key Management in Dynamic Wireless Sensor Networks

7 years ago

Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient…

DISTORTION-AWARE CONCURRENT MULTIPATH TRANSFER FOR MOBILE VIDEO STREAMING IN HETEROGENEOUS WIRELESS NETWORKS

7 years ago

ABSTRACT: The massive proliferation of wireless infrastructures with complementary characteristics prompts the bandwidth aggregation for Concurrent Multipath Transfer (CMT) over…

Defeating Jamming With the Power of Silence A Game-Theoretic Analysis

7 years ago

Abstract: The timing channel is a logical communication channel in which information is encoded in the timing between events. Recently,…

DATA-STREAM-BASED INTRUSION DETECTION SYSTEM FOR ADVANCED METERING INFRASTRUCTURE IN SMART GRID: A FEASIBILITY STUDY

7 years ago

ABSTRACT: In this paper, we will focus on the security of advanced metering infrastructure (AMI), which is one of the…

DATA-DRIVEN COMPOSITION FOR SERVICE-ORIENTED SITUATIONAL WEB APPLICATIONS

7 years ago

ABSTRACT: This paper presents a systematic data-driven approach to assisting situational application development. We first propose a technique to extract…

Data Collection in Multi-Application Sharing Wireless Sensor Networks

7 years ago

Data sharing for data collection among multiple applications is an efficient way to reduce communication cost for Wireless Sensor Networks…

COST-AWARE SECURE ROUTING (CASER) PROTOCOL DESIGN FOR WIRELESS SENSOR NETWORKS

7 years ago

ABSTRACT: Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenishable energy resources.…

CONTENT-BASED IMAGE RETRIEVAL USING ERROR DIFFUSION BLOCK TRUNCATION CODING FEATURES

7 years ago

ABSTRACT: This paper presents a new approach to index color images using the features extracted from the error diffusion block…

AUTHENTICATION HANDOVER AND PRIVACY PROTECTION IN 5G HETNETS USING SOFTWARE-DEFINED NETWORKING

7 years ago

ABSTRACT: Recently, densified small cell deployment with overlay coverage through coexisting heterogeneous networks has emerged as a viable solution for…

Authenticated Key Exchange Protocols for Parallel Network File Systems

7 years ago

We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of large-scale…

AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF THINGS

7 years ago

ABSTRACT: The Internet of Things (IoT) is becoming an attractive system paradigm to realize interconnections through the physical, cyber, and…

A TIME EFFICIENT APPROACH FOR DETECTING ERRORS IN BIG SENSOR DATA ON CLOUD

7 years ago

ABSTRACT: Big sensor data is prevalent in both industry and scientific research applications where the data is generated with high…

A SCALABLE AND RELIABLE MATCHING SERVICE FOR CONTENT-BASED PUBLISH/SUBSCRIBE SYSTEMS

7 years ago

ABSTRACT: Characterized by the increasing arrival rate of live content, the emergency applications pose a great challenge: how to disseminate…

Android Project Ideas

MCA Project Topics

Android Projects Titles

Categories

PHP Project Ideas