Android app ideas for students

NEIGHBOR SIMILARITY TRUST AGAINST SYBIL ATTACK IN P2P E-COMMERCE

ABSTRACT: In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that…

5 years ago

MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE ADHOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING

ABSTRACT: File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. The…

5 years ago

Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

Abstract—Media streaming applications have recently attracted a large number of users in the Internet. With the advent of these bandwidth-intensive…

5 years ago

IMPROVING WEB NAVIGATION USABILITY BY COMPARING ACTUAL AND ANTICIPATED USAGE

ABSTRACT: We present a new method to identify navigation related Web usability problems based on comparing actual and anticipated usage…

5 years ago

Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques

Due to the broadcast nature of radio propagation, wireless transmission can be readily overheard by unauthorized users for interception purposes…

5 years ago

IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING

ABSTRACT: Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important…

5 years ago

IDENTITY-BASED DISTRIBUTED PROVABLE DATA POSSESSION IN MULTI-CLOUD STORAGE

ABSTRACT: Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their…

5 years ago

GENERATING SEARCHABLE PUBLIC-KEY CIPHERTEXTS WITH HIDDEN STRUCTURES FOR FAST KEYWORD SEARCH

ABSTRACT: In this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without…

5 years ago

FRIENDBOOK A SEMANTIC-BASED FRIEND RECOMMENDATION

ABSTRACT: Existing social networking services recommend friends to users based on their social graphs, which may not be the most…

5 years ago

ENERGY EFFICIENT VIRTUAL NETWORK EMBEDDING FOR CLOUD NETWORKS

ABSTRACT: In this paper, we propose an energy efficient virtual network embedding (EEVNE) approach for cloud computing networks, where power…

5 years ago

Enabling Fine-grained Multi-keyword Search

Abstract—Using cloud computing, individuals can store their data on remote servers and allow data access to public users through the…

5 years ago

ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH

ABSTRACT: In mobile cloud computing, a fundamental application is to outsource the mobile data to external cloud servers for scalable…

5 years ago

EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval

Abstract—Graph-based ranking models have been widely applied in information retrieval area. In this paper, we focus on a well known…

5 years ago

Effective Key Management in Dynamic Wireless Sensor Networks

Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient…

5 years ago

DISTORTION-AWARE CONCURRENT MULTIPATH TRANSFER FOR MOBILE VIDEO STREAMING IN HETEROGENEOUS WIRELESS NETWORKS

ABSTRACT: The massive proliferation of wireless infrastructures with complementary characteristics prompts the bandwidth aggregation for Concurrent Multipath Transfer (CMT) over…

5 years ago

Android Project Ideas

MCA Project Topics

Android Projects Titles

Categories

PHP Project Ideas