2019-2020

Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care

Abstract Intelligently extracting knowledge from social media has recently attracted great interest from the Biomedical and Health Informatics community to…

5 years ago

NEIGHBOR SIMILARITY TRUST AGAINST SYBIL ATTACK IN P2P E-COMMERCE

ABSTRACT: In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that…

5 years ago

MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE ADHOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING

ABSTRACT: File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. The…

5 years ago

Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

Abstract—Media streaming applications have recently attracted a large number of users in the Internet. With the advent of these bandwidth-intensive…

5 years ago

IMPROVING WEB NAVIGATION USABILITY BY COMPARING ACTUAL AND ANTICIPATED USAGE

ABSTRACT: We present a new method to identify navigation related Web usability problems based on comparing actual and anticipated usage…

5 years ago

Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques

Due to the broadcast nature of radio propagation, wireless transmission can be readily overheard by unauthorized users for interception purposes…

5 years ago

IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING

ABSTRACT: Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important…

5 years ago

IDENTITY-BASED DISTRIBUTED PROVABLE DATA POSSESSION IN MULTI-CLOUD STORAGE

ABSTRACT: Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their…

5 years ago

GENERATING SEARCHABLE PUBLIC-KEY CIPHERTEXTS WITH HIDDEN STRUCTURES FOR FAST KEYWORD SEARCH

ABSTRACT: In this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without…

5 years ago

FRIENDBOOK A SEMANTIC-BASED FRIEND RECOMMENDATION

ABSTRACT: Existing social networking services recommend friends to users based on their social graphs, which may not be the most…

5 years ago

ENERGY EFFICIENT VIRTUAL NETWORK EMBEDDING FOR CLOUD NETWORKS

ABSTRACT: In this paper, we propose an energy efficient virtual network embedding (EEVNE) approach for cloud computing networks, where power…

5 years ago

Enabling Fine-grained Multi-keyword Search

Abstract—Using cloud computing, individuals can store their data on remote servers and allow data access to public users through the…

5 years ago

ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH

ABSTRACT: In mobile cloud computing, a fundamental application is to outsource the mobile data to external cloud servers for scalable…

5 years ago

EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval

Abstract—Graph-based ranking models have been widely applied in information retrieval area. In this paper, we focus on a well known…

5 years ago

Effective Key Management in Dynamic Wireless Sensor Networks

Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient…

5 years ago

Android Project Ideas

MCA Project Topics

Android Projects Titles

Categories

PHP Project Ideas