PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE

6 years ago

ABSTRACT: Statistics from security firms, research institutions and government organizations show that the numbers of data-leak instances have grown rapidly…

PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES

6 years ago

 ABSTRACT: With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as…

Developing NFC Applications with Android

6 years ago

Developing NFC Applications with Android NFC applications can be developed in the three NFC operating modes: – in the reader/writer…

PREDICTING ASTHMA-RELATED EMERGENCY DEPARTMENT VISITS USING BIG DATA

6 years ago

ABSTRACT: Asthma is one of the most prevalent and costly chronic conditions in the United States which cannot be cured.…

PERFORMING INITIATIVE DATA PREFETCHING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD COMPUTING

6 years ago

ABSTRACT: An initiative data prefetching scheme on the storage servers in distributed file systems for cloud computing. In this prefetching…

PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKSCATTER

6 years ago

ABSTRACT: It is long known attackers may use forged source IP address to conceal their real locations. To capture the…

Optimal Configuration of Network Coding in Ad Hoc Networks

6 years ago

Abstract:  Analyze the impact of network coding (NC) configuration on the performance of ad hoc networks with the consideration of…

ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR BIG DATA APPLICATIONS

6 years ago

ABSTRACT: MapReduce job, we consider to aggregate data with the same keys before sending them to remote reduce tasks. Although…

Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care

6 years ago

Abstract Intelligently extracting knowledge from social media has recently attracted great interest from the Biomedical and Health Informatics community to…

NEIGHBOR SIMILARITY TRUST AGAINST SYBIL ATTACK IN P2P E-COMMERCE

6 years ago

ABSTRACT: In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that…

PHP Project Ideas

MCA Project Topics

Categories

Android Project Ideas