A DISTRIBUTED THREE-HOP ROUTING PROTOCOL TO INCREASE THE CAPACITY OF HYBRID WIRELESS NETWORKS

5 years ago

ABSTRACT: Hybrid wireless networks combining the advantages of both mobile ad-hoc networks and infrastructure wireless networks have been receiving increased…

A DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS MULTIHOP NETWORKS

5 years ago

ABSTRACT: Traditional routing metrics designed for wireless networks are application agnostic. In this paper, we consider a wireless network where…

Single Image Super-Resolution Based on Gradient Profile Sharpness

5 years ago

ABSTRACT In this paper, a novel image superresolution algorithm is proposed based on GPS (Gradient Profile Sharpness). GPS is an…

REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION

5 years ago

ABSTRACT: In today’s era, there is a great deal added to real-time remote sensing Big Data than it seems at…

RANK-BASED SIMILARITY SEARCH REDUCING THE DIMENSIONAL DEPENDENCE

5 years ago

ABSTRACT: This paper introduces a data structure for k-NN search, the Rank Cover Tree (RCT), whose pruning tests rely solely…

PSMPA: PATIENT SELF-CONTROLLABLE AND MULTI-LEVEL PRIVACY-PRESERVING COOPERATIVE AUTHENTICATION IN DISTRIBUTED M-HEALTHCARE CLOUD COMPUTING SYSTEM

5 years ago

ABSTRACT: The Distributed m-healthcare cloud computing system considerably facilitates secure and efficient patient treatment for medical consultation by sharing personal…

PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE

5 years ago

ABSTRACT: Statistics from security firms, research institutions and government organizations show that the numbers of data-leak instances have grown rapidly…

PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKSCATTER

5 years ago

 ABSTRACT: It is long known attackers may use forged source IP address to conceal their real locations. To capture the…

PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE CLOUD

5 years ago

ABSTRACT: With data storage and sharing services in the cloud, users can easily modify and share data as a group.…

NEIGHBOR SIMILARITY TRUST AGAINST SYBIL ATTACK IN P2P E-COMMERCE

5 years ago

In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that our…

PHP Project Ideas

MCA Project Topics

Categories

Android Project Ideas