We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
Securing mobile cloud using finger print authenticationIJNSA Journal
The document summarizes a research paper that proposes using fingerprint recognition for user authentication in mobile cloud computing. It introduces mobile cloud computing and the need to improve security by strengthening authentication methods. The proposed approach uses a mobile phone's camera to capture fingerprint images for authentication instead of additional hardware. The algorithm extracts features from captured images and matches them to stored templates. Experimental results on different mobile devices found processing times below standards. The solution was concluded to enhance mobile cloud security through accessible and cross-platform fingerprint authentication.
The common challenges of mobile internet for up coming generationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
With the explosive growth of mobile applications and extensive praxis of cloud computing, mobile cloud computing has been introduced to be a potential technology for mobile services. But privacy is the main concern for a mobile user in the modern era. In the current study, we address the privacy challenges faced by mobile users while outsourcing their data to the service provider for storage and processing. However, a secure mobile user is required to protect these fundamental privacy factors such as their personal data, real identity, current location and the actual query sent to the cloud vendor server while availing different cloud services. Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing. The primary focus of this study is to presents a critical survey of recent privacy protection techniques. Leading to objective, the current study conduct a comparative analysis of these state of the art methods with their strong points, privacy level and scalability. After analysis, this paper suggests the pseudo-random permutation method could be a promising solution that can be taken into consideration for preserving user personal information and data query privacy in MCC more efficiently. Primarily, the purpose of the survey was to focus on further advancements of the suggested method. Furthermore, we present the future research directions in the mobile cloud computing paradigms.
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
Design and implementation of intelligent community system based on thin clien...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
Securing mobile cloud using finger print authenticationIJNSA Journal
The document summarizes a research paper that proposes using fingerprint recognition for user authentication in mobile cloud computing. It introduces mobile cloud computing and the need to improve security by strengthening authentication methods. The proposed approach uses a mobile phone's camera to capture fingerprint images for authentication instead of additional hardware. The algorithm extracts features from captured images and matches them to stored templates. Experimental results on different mobile devices found processing times below standards. The solution was concluded to enhance mobile cloud security through accessible and cross-platform fingerprint authentication.
The common challenges of mobile internet for up coming generationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
With the explosive growth of mobile applications and extensive praxis of cloud computing, mobile cloud computing has been introduced to be a potential technology for mobile services. But privacy is the main concern for a mobile user in the modern era. In the current study, we address the privacy challenges faced by mobile users while outsourcing their data to the service provider for storage and processing. However, a secure mobile user is required to protect these fundamental privacy factors such as their personal data, real identity, current location and the actual query sent to the cloud vendor server while availing different cloud services. Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing. The primary focus of this study is to presents a critical survey of recent privacy protection techniques. Leading to objective, the current study conduct a comparative analysis of these state of the art methods with their strong points, privacy level and scalability. After analysis, this paper suggests the pseudo-random permutation method could be a promising solution that can be taken into consideration for preserving user personal information and data query privacy in MCC more efficiently. Primarily, the purpose of the survey was to focus on further advancements of the suggested method. Furthermore, we present the future research directions in the mobile cloud computing paradigms.
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
Design and implementation of intelligent community system based on thin clien...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
This document proposes enhancing social network security through smart credentials. It discusses how current social networks have weak authentication that allows identity cloning attacks. The document then presents using discrete wavelet transform for data hiding and watermarking uploaded images to help prevent clone attacks. It provides block diagrams of the proposed transmitter and receiver systems. When a user uploads an image, it would be watermarked with their credentials. This allows detecting if another user tries to use the same image to create a fake profile. Overall, the proposed system aims to provide more secure authentication and prevent clone attacks on social networks.
Optimal content downloading in vehicular network with density measurementZac Darcy
The existence of Internet-connected navigation and infotainment systems is becoming a truth that will easily lead to a remarkable growth in bandwidth demand by in-vehicle users. In Examples the applications of vehicular communication proliferate, and range from the updating of road maps to the repossession of nearby points of interest, downloading of touristic information and multimedia files. This content downloading system will induce the vehicular user to use the resource to the same extent as today’s mobile customers. By this approach communication-enabled vehicles are paying attention in downloading different contents from Internet-based servers. We summarize the performance limits of such a vehicular multimedia content downloading system by modeling the content downloading process as an effective problem and developing the overall system throughput with density measurement. Results highlight the methods where the Roadside infrastructure i.e., access points are working at different capabilities irrespective of vehicle density, the vehicle-to-vehicle communication.
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...Nexgen Technology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
This document discusses third-party emergency alert systems that send SMS messages and their security limitations. It proposes a system where when an accident occurs, a software on the mobile phone of the affected person would automatically send a message without them having to type it. This message would be received by a service center using a GSM modem which could then identify the accident location using the mobile number and tower location. The appropriate emergency services like police and fire department would be informed to reduce response times. The document also discusses related work on denial of service attacks, SMS network architecture and address filtering.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
This document discusses developing a taxonomy to map relationships between applications, virtual machines, hosts, and clients when performing upgrades and patches. It proposes creating a taxonomy based on analyzing errors that occur during application execution to understand dependencies. The taxonomy would classify applications based on their libraries, operating systems, and browsers to provide a troubleshooting guideline for upgrades. An experiment upgrading an application called Crawling encountered errors due to dependencies on older software versions. Mapping the application criteria and relationships in a taxonomy could help identify the root cause of issues and the steps to resolve them.
This document discusses security issues in cloud computing. It begins by defining cloud computing and describing its service models and deployment models. It then identifies several key security issues in cloud computing, including security, privacy, reliability, lack of open standards, compliance, and concerns about long-term viability of data. Security is identified as the top challenge according to a survey of IT executives. The document argues that more must be done to address security, privacy, and other issues in order to fully realize the potential of cloud computing.
Narrative of digital signature technology and moving forwardConference Papers
1) The document discusses the development of a digital signature solution for web browsers over time, addressing changing technologies and standards.
2) Three key technology curves impacted the solution's design: the evolution of web extensions, compatibility across browsers, and digital certificate issuance standards.
3) The final solution released uses a client-server architecture with a web script to simplify digital signatures as a service, addressing challenges around cross-browser compatibility and changing extension technologies in browsers like Internet Explorer, Firefox and Chrome over the past 20 years.
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets
1) The document discusses route optimization techniques for solving the triangle routing problem in Mobile IPv4, specifically evaluating the performance of the Internet Service Provider Mobile Border Gateway (ISP MBG) scheme.
2) It provides background on Mobile IP, the triangle routing problem, and introduces the ISP MBG technique for optimizing routes.
3) The study evaluates the performance of ISP MBG by varying system parameters like number of nodes and zones, finding it provides shorter transmission times compared to conventional Mobile IP.
Distributed reflection denial of service attack: A critical review IJECEIAES
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...ijcsit
In supporting its large scale, multidisciplinary scientific research efforts across all the university campuses and by the research personnel spread over literally every corner of the state, the state of Nevada needs to build and leverage its own Cyber infrastructure. Following the well-established as-a-service model, this state-wide Cyber infrastructure that consists of data acquisition, data storage, advanced instruments, visualization, computing and information processing systems, and people, all seamlessly linked together through a high-speed network, is designed and operated to deliver the benefits of Cyber infrastructure-as-aService (CaaS).There are three major service groups in this CaaS, namely (i) supporting infrastructural
services that comprise sensors, computing/storage/networking hardware, operating system, management tools, virtualization and message passing interface (MPI); (ii) data transmission and storage services that provide connectivity to various big data sources, as well as cached and stored datasets in a distributed
storage backend; and (iii) processing and visualization services that provide user access to rich processing and visualization tools and packages essential to various scientific research workflows. Built on commodity hardware and open source software packages, the Southern Nevada Research Cloud(SNRC)and a data repository in a separate location constitute a low cost solution to deliver all these services around CaaS. The service-oriented architecture and implementation of the SNRC are geared to encapsulate as much detail of big data processing and cloud computing as possible away from end users; rather scientists only need to learn and access an interactive web-based interface to conduct their collaborative, multidisciplinary, dataintensive research. The capability and easy-to-use features of the SNRC are demonstrated through a use case that attempts to derive a solar radiation model from a large data set by regression analysis.
Ijeee 16-19-digital media hidden data extractingKumar Goud
Abstract— Magnetic Resonance Imaging (MRI) brain tumor image classification is a difficult task due to the variance and complexity of tumors. This paper presents an efficient techniques for the classification of the magnetic resonance brain images. In this work we are taking MR images as input; MRI which is directed into internal cavity of brain and gives the complete image of the brain. The proposed technique consists of two stages.In the first stage, discrete wavelet transform is used for dimensionality reduction and feature extraction.In the second stage, classification is performed using the probabilistic neural network. The classifier have been used to classify real MR images as benign (non-cancerous) and Malignant (cancerous). Probabilistic neural network (PNN) with image and data processing technique is employed to implement an automated brain tumor classification. The use of artificial intelligent technique has shown great potential in this field.
Index Terms— Brain tumors, Feature extraction,Classification, MRI, Probabilistic neural network, Dimensionality reduction, Discrete wavelet transform.
This document proposes a Blockchain Secured Biometric Access System (BSBAS) that uses blockchain technology to securely store biometric data and reduce the risk of identity fraud. The system works as follows:
1) A user registers by submitting biometric data (e.g. fingerprint, facial scan) which is converted into a binary format and hashed.
2) The hashed biometric data is stored immutably in a blockchain.
3) When the user wants access, their biometric data is hashed and compared to the hashed data stored on the blockchain. If it matches, access is granted.
Storing biometric data on the blockchain makes it more secure and reduces the risk of biometric
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...HarshitParkar6677
creating a new environment, namely the Internet of Things
(IoT), that enables a wide range of future Internet applications.
In this work, we present Mobile Fog, a high level
programming model for future Internet applications that are
geospatially distributed, large–scale, and latency–sensitive.
We analyze use cases for the programming model with camera
network and connected vehicle applications to show the
efficacy of Mobile Fog. We also evaluate application performance
through simulation.
Analysis of programming aspects of wireless sensor networksiaemedu
This document discusses programming aspects of wireless sensor networks and non-uniformity issues. It analyzes programming efforts for developing test cases using wireless sensor network solutions versus traditional tools. It also explores system performance based on metrics like overhead, energy usage, and resource utilization. Key frameworks discussed include WiSeKit for adaptive applications, Remora for component-based programming, and extensions that enable distributed sensor services, dynamic reconfiguration, and integration with Internet systems.
Abstract: The dramatic growth of smartphones in recent years, the challenge of limited energy capacity of these devices has not been solved satisfactorily. However, in the era of cloud computing, the limitation on energy capacity can be eased off in an efficient way by offloading heavy tasks to the cloud. It is important for smartphone and cloud computing developers to have insights into the energy cost of smartphone applications before implementing the offloading techniques.
In this paper, we evaluate the energy cost of multimedia applications on smartphones that are connected to Multimedia Cloud Computing (MCC). In other words, we investigate the feasibility of MCC. Specifically, we compared the energy costs for uploading and downloading a audio file to and from MCC with the energy costs of encoding the same audio file on a smartphone. The aforementioned comparison was performed by using HTTP and FTP Internet protocols with 3G and Wi-Fi network interfaces.
The document discusses the value of pharmaceutical innovation for patients, families, and society. It describes the long battle of identifying diseases and developing treatments from discovery to production and cure. It also addresses modern challenges such as moving from palliative to curative treatments, epidemics, orphan diseases, and moving from organ-based to gene- and neuron-based approaches. The document calls for institutional innovation beyond over-regulatory models to models that support patient choice.
This document proposes enhancing social network security through smart credentials. It discusses how current social networks have weak authentication that allows identity cloning attacks. The document then presents using discrete wavelet transform for data hiding and watermarking uploaded images to help prevent clone attacks. It provides block diagrams of the proposed transmitter and receiver systems. When a user uploads an image, it would be watermarked with their credentials. This allows detecting if another user tries to use the same image to create a fake profile. Overall, the proposed system aims to provide more secure authentication and prevent clone attacks on social networks.
Optimal content downloading in vehicular network with density measurementZac Darcy
The existence of Internet-connected navigation and infotainment systems is becoming a truth that will easily lead to a remarkable growth in bandwidth demand by in-vehicle users. In Examples the applications of vehicular communication proliferate, and range from the updating of road maps to the repossession of nearby points of interest, downloading of touristic information and multimedia files. This content downloading system will induce the vehicular user to use the resource to the same extent as today’s mobile customers. By this approach communication-enabled vehicles are paying attention in downloading different contents from Internet-based servers. We summarize the performance limits of such a vehicular multimedia content downloading system by modeling the content downloading process as an effective problem and developing the overall system throughput with density measurement. Results highlight the methods where the Roadside infrastructure i.e., access points are working at different capabilities irrespective of vehicle density, the vehicle-to-vehicle communication.
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...Nexgen Technology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
This document discusses third-party emergency alert systems that send SMS messages and their security limitations. It proposes a system where when an accident occurs, a software on the mobile phone of the affected person would automatically send a message without them having to type it. This message would be received by a service center using a GSM modem which could then identify the accident location using the mobile number and tower location. The appropriate emergency services like police and fire department would be informed to reduce response times. The document also discusses related work on denial of service attacks, SMS network architecture and address filtering.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
This document discusses developing a taxonomy to map relationships between applications, virtual machines, hosts, and clients when performing upgrades and patches. It proposes creating a taxonomy based on analyzing errors that occur during application execution to understand dependencies. The taxonomy would classify applications based on their libraries, operating systems, and browsers to provide a troubleshooting guideline for upgrades. An experiment upgrading an application called Crawling encountered errors due to dependencies on older software versions. Mapping the application criteria and relationships in a taxonomy could help identify the root cause of issues and the steps to resolve them.
This document discusses security issues in cloud computing. It begins by defining cloud computing and describing its service models and deployment models. It then identifies several key security issues in cloud computing, including security, privacy, reliability, lack of open standards, compliance, and concerns about long-term viability of data. Security is identified as the top challenge according to a survey of IT executives. The document argues that more must be done to address security, privacy, and other issues in order to fully realize the potential of cloud computing.
Narrative of digital signature technology and moving forwardConference Papers
1) The document discusses the development of a digital signature solution for web browsers over time, addressing changing technologies and standards.
2) Three key technology curves impacted the solution's design: the evolution of web extensions, compatibility across browsers, and digital certificate issuance standards.
3) The final solution released uses a client-server architecture with a web script to simplify digital signatures as a service, addressing challenges around cross-browser compatibility and changing extension technologies in browsers like Internet Explorer, Firefox and Chrome over the past 20 years.
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets
1) The document discusses route optimization techniques for solving the triangle routing problem in Mobile IPv4, specifically evaluating the performance of the Internet Service Provider Mobile Border Gateway (ISP MBG) scheme.
2) It provides background on Mobile IP, the triangle routing problem, and introduces the ISP MBG technique for optimizing routes.
3) The study evaluates the performance of ISP MBG by varying system parameters like number of nodes and zones, finding it provides shorter transmission times compared to conventional Mobile IP.
Distributed reflection denial of service attack: A critical review IJECEIAES
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...ijcsit
In supporting its large scale, multidisciplinary scientific research efforts across all the university campuses and by the research personnel spread over literally every corner of the state, the state of Nevada needs to build and leverage its own Cyber infrastructure. Following the well-established as-a-service model, this state-wide Cyber infrastructure that consists of data acquisition, data storage, advanced instruments, visualization, computing and information processing systems, and people, all seamlessly linked together through a high-speed network, is designed and operated to deliver the benefits of Cyber infrastructure-as-aService (CaaS).There are three major service groups in this CaaS, namely (i) supporting infrastructural
services that comprise sensors, computing/storage/networking hardware, operating system, management tools, virtualization and message passing interface (MPI); (ii) data transmission and storage services that provide connectivity to various big data sources, as well as cached and stored datasets in a distributed
storage backend; and (iii) processing and visualization services that provide user access to rich processing and visualization tools and packages essential to various scientific research workflows. Built on commodity hardware and open source software packages, the Southern Nevada Research Cloud(SNRC)and a data repository in a separate location constitute a low cost solution to deliver all these services around CaaS. The service-oriented architecture and implementation of the SNRC are geared to encapsulate as much detail of big data processing and cloud computing as possible away from end users; rather scientists only need to learn and access an interactive web-based interface to conduct their collaborative, multidisciplinary, dataintensive research. The capability and easy-to-use features of the SNRC are demonstrated through a use case that attempts to derive a solar radiation model from a large data set by regression analysis.
Ijeee 16-19-digital media hidden data extractingKumar Goud
Abstract— Magnetic Resonance Imaging (MRI) brain tumor image classification is a difficult task due to the variance and complexity of tumors. This paper presents an efficient techniques for the classification of the magnetic resonance brain images. In this work we are taking MR images as input; MRI which is directed into internal cavity of brain and gives the complete image of the brain. The proposed technique consists of two stages.In the first stage, discrete wavelet transform is used for dimensionality reduction and feature extraction.In the second stage, classification is performed using the probabilistic neural network. The classifier have been used to classify real MR images as benign (non-cancerous) and Malignant (cancerous). Probabilistic neural network (PNN) with image and data processing technique is employed to implement an automated brain tumor classification. The use of artificial intelligent technique has shown great potential in this field.
Index Terms— Brain tumors, Feature extraction,Classification, MRI, Probabilistic neural network, Dimensionality reduction, Discrete wavelet transform.
This document proposes a Blockchain Secured Biometric Access System (BSBAS) that uses blockchain technology to securely store biometric data and reduce the risk of identity fraud. The system works as follows:
1) A user registers by submitting biometric data (e.g. fingerprint, facial scan) which is converted into a binary format and hashed.
2) The hashed biometric data is stored immutably in a blockchain.
3) When the user wants access, their biometric data is hashed and compared to the hashed data stored on the blockchain. If it matches, access is granted.
Storing biometric data on the blockchain makes it more secure and reduces the risk of biometric
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...HarshitParkar6677
creating a new environment, namely the Internet of Things
(IoT), that enables a wide range of future Internet applications.
In this work, we present Mobile Fog, a high level
programming model for future Internet applications that are
geospatially distributed, large–scale, and latency–sensitive.
We analyze use cases for the programming model with camera
network and connected vehicle applications to show the
efficacy of Mobile Fog. We also evaluate application performance
through simulation.
Analysis of programming aspects of wireless sensor networksiaemedu
This document discusses programming aspects of wireless sensor networks and non-uniformity issues. It analyzes programming efforts for developing test cases using wireless sensor network solutions versus traditional tools. It also explores system performance based on metrics like overhead, energy usage, and resource utilization. Key frameworks discussed include WiSeKit for adaptive applications, Remora for component-based programming, and extensions that enable distributed sensor services, dynamic reconfiguration, and integration with Internet systems.
Abstract: The dramatic growth of smartphones in recent years, the challenge of limited energy capacity of these devices has not been solved satisfactorily. However, in the era of cloud computing, the limitation on energy capacity can be eased off in an efficient way by offloading heavy tasks to the cloud. It is important for smartphone and cloud computing developers to have insights into the energy cost of smartphone applications before implementing the offloading techniques.
In this paper, we evaluate the energy cost of multimedia applications on smartphones that are connected to Multimedia Cloud Computing (MCC). In other words, we investigate the feasibility of MCC. Specifically, we compared the energy costs for uploading and downloading a audio file to and from MCC with the energy costs of encoding the same audio file on a smartphone. The aforementioned comparison was performed by using HTTP and FTP Internet protocols with 3G and Wi-Fi network interfaces.
The document discusses the value of pharmaceutical innovation for patients, families, and society. It describes the long battle of identifying diseases and developing treatments from discovery to production and cure. It also addresses modern challenges such as moving from palliative to curative treatments, epidemics, orphan diseases, and moving from organ-based to gene- and neuron-based approaches. The document calls for institutional innovation beyond over-regulatory models to models that support patient choice.
This document describes a numerical study of raindrop impact on saturated soil. It presents simulations using the discrete phase method (DPM) to model soil particles and the volume of fluid (VOF) method to model water flow. The DPM models individual soil particles eroded by raindrop impact, while the VOF provides the flow field of the water phase. Simulations are conducted for raindrops of 2 mm and 4 mm in diameter, corresponding to terminal velocities of 2.36 m/s and 7.65 m/s. The results show soil particle splash occurring over 50 ms for both droplet sizes. While this initial study couples DPM and VOF, future work is needed to more precisely simulate
This document provides an introduction to FIDO (Fast IDentity Online), a standardized authentication framework that enables scalable and faster access to web resources without requiring users to remember complicated passwords. It discusses problems with traditional password-based authentication and outlines FIDO's two main specifications: UAF (Universal Authentication Framework), which supports passwordless authentication using built-in authenticators, and U2F (Universal Second Factor), which adds a second factor of authentication to password login. The document explains FIDO components, protocols, and architecture in detail and provides examples of how FIDO enables secure authentication flows. It also discusses next steps for further standardization and adoption of FIDO.
The document provides an overview of SAVIC, an SAP implementation partner. It discusses SAVIC's service offerings including implementations of SAP, Newgen, Intralinks and other solutions. It also outlines SAVIC's implementation methodology using the SAP Activate framework with phases for prepare, explore, realize and deploy. The methodology focuses on iterative development and testing.
The document discusses the FIDO Alliance, which aims to address password problems and vulnerabilities by developing open authentication standards called FIDO. FIDO uses public key cryptography during authentication to securely verify users to online services from any device. The Alliance has over 250 members developing FIDO specifications and certification programs to advance adoption. Several large companies have implemented FIDO standards to strengthen authentication for their users and services.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
Running headCapstone Project Activity - Unit 2 2C.docxrtodd599
Running head:Capstone Project Activity - Unit 2
2
Capstone Project Activity - Unit 2
Student Name
Frank Owusu Boadu
Course
Program Capstone in IT
Date
09/02/2018
Capstone Project Activity - Unit 2
Which type of network topology would you recommend for the corporate backbone and the wired and wireless connections? Why do you think this would be the best choice?
Internet bubble burst led to many reforms in most organizations. The reforms were due to the value of equity markets which grew rapidly. Rapid technology advancement led to the highest capital growth in the industries which later contributed to them crushing. One of this industries is the Verbania, Inc. which was shut down in the early 20’s. The company now wants to reinvent and launch itself again. To do this, it will need to create a well-integrated social relationship platform that goes in hand with other technologies for instance the CRM. The company will require an efficient network topology such as Bus topology. This kind of network will enable computers and other network devices stay connected on a single cable. It will transmit data in only one direction since it will have only two end points also known as the Linear Bus Topology. This will enable every device to stay connected to the network. This kind of Topology will be advantageous to the company as it is cost effective and easy to expand. However, in case the cable fails it means the whole network fails. For wireless connections, the company can use HYBRID Topology. This kind of topology is reliable as detecting errors is quit very easy (Rahman, & Esmailpour, April 2014). This makes the topology be regarded as effective and flexible. However, the design is complex and costly to install, this is because it is a combination of two topologies.
Which type of cabling would you recommend? Why do you think this would be the best choice?
To complete these networking, the company will require several networking cabling. Cabling carries data across the network, voice, serial-communications, alarm signals, video and audio transmission. This is why the company will require a reliable and well-designed structured cabling system. Cabling typical accounts for less than 10% of the total cost of network infrastructure (Croft, et al 2011). You can be sure the life span of the cabling system is more than 16 years if well installed. It is also important to know that more than half of the problems related to networking are due to poor cabling. This problems are such as slow access while accessing information. There are several communication cabling; this are twisted-pair, shielded or screened twisted pair and fiber optic. However, it is important to distinguish between the backbone cables and the horizontal cables. The backbone cables connect devices such as; servers, switches and routers while the horizontal cables connect the communication closets and the wall outlets. To bring the company back to life, twisted-pair cable can be.
Parallel and Distributed System IEEE 2015 ProjectsVijay Karan
List of Parallel and Distributed System IEEE 2015 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for the year 2015
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...John Britto
Iris Solutions is a Leading ISO Certified R&D Company. We Providing Professional Courses & Final Year Projects with Innovative training Methods. All classes are Handling By Well Qualified Staffs.Also Provide Job support for qualified candidates. Projects in Java, J2ee, Vb, C#, .Net, Embedded, VLSI & Matlab. domain Using Networking, Network security, Mobile computing, Image Processing,etc......Eligibility:M.E /M.TECH, MCA, M.Sc(CSE, IT)B.E/ B.TECH (ECE, EEE, E&I, ICE, CSE, IT)DIPLOMA (ECE, E&I, EEE, CSE, IT, ROBOTICS)BCA, B.Sc (CSE, IT)
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )SBGC
ieee projects 2013 for me cse trichy, ieee projects 2013 for me cse Karur, ieee projects 2013 for me cse chennai, ieee projects 2013 for me cse, ieee projects, ieee projects for cse, ieee projects 2013, ieee projects 2013 for me cse Thanjavur, ieee projects 2013 for me cse Perambalur,
This document provides information about IEEE projects provided by SEABIRDS. It lists the domains and technologies that projects are available in, including Java, J2ME, J2EE, .NET, MATLAB, and NS2. It describes the two categories of project assistance provided - for students with their own project ideas or selecting from their list. It lists the types of students they provide projects for, including various engineering and technology degrees as well as business and management degrees. It also lists the deliverables and support provided for projects.
Ieee projects-2013-2014-title-list-for-me-be-mphil-final-year-studentsPruthivi Rajan
This document provides information about IEEE projects provided by SEABIRDS. It lists the domains and technologies that projects are available in, including Java, J2ME, J2EE, .NET, MATLAB, and NS2. It describes the two categories of project assistance provided - for students with their own project ideas or selecting from their project list. Details are provided about the project deliverables and support provided. A list is then given of the engineering and technology degrees and programs that projects are available for.
Parallel and Distributed System IEEE 2015 ProjectsVijay Karan
List of Parallel and Distributed System IEEE 2015 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for the year 2015
This document describes several C# projects from IEEE 2014, including summaries of each project. The projects cover topics like localizing jammers in wireless networks, network-coding based cloud storage, privacy-preserving search on encrypted cloud data, compatibility-aware cloud service composition, analyzing social media to understand students' experiences, viral marketing in social networks, opportunistic MAC for underwater sensor networks, WLAN monitoring systems, anonymous vehicle positioning in vehicular networks, and information flow control for cloud security.
Survey on Peer to Peer Car Sharing System Using BlockchainIRJET Journal
1. The document discusses a survey of a peer-to-peer car sharing system using blockchain technology. It aims to provide a decentralized and secure authentication method for car sharing.
2. Currently, centralized car sharing systems have security issues as user data is transmitted over public channels. The proposed system uses blockchain to provide a decentralized car sharing service and ensure accurate service information.
3. The proposed authentication protocol is analyzed using BAN logic and AVISPA simulations to demonstrate its security against replay and man-in-the-middle attacks. The system allows for secure mutual authentication between users, stations, and owners.
Parallel and distributed system projects for java and dot netredpel dot com
This document contains summaries of 8 papers related to distributed systems, cloud computing, and information security. The papers cover topics such as stochastic modeling of data center performance in cloud systems, cost-effective privacy preservation of intermediate data sets in the cloud, capacity of data collection in wireless sensor networks, denial-of-service attack detection using multivariate correlation analysis, dynamic resource allocation using virtual machines in cloud computing, secure outsourcing of large-scale systems of linear equations to the cloud, and deanonymization attacks against anonymized social networks.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Similar to Networking java titles Adrit Solution (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
1. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
1. IEEE 2016: STAMP: Enabling Privacy-Preserving Location Proofs for Mobile
Users
Abstract: Location-based services are quickly becoming immensely popular. In addition to
services based on users' current location, many potential services rely
on users' location history, or their spatial-temporal provenance. Malicious users may lie
about their spatial-temporal provenance without a carefully designed security system
for users to prove their past locations. In this paper, we present the Spatial-Temporal
provenance Assurance with Mutual Proofs (STAMP) scheme. STAMP is designed for ad-hoc
mobile users generating location proofs for each other in a distributed setting. However, it
can easily accommodate trusted mobile users and wireless access points. STAMP ensures the
integrity and non-transferability of the location proofs and protects users' privacy. A semi-
trusted Certification Authority is used to distribute cryptographic keys as well as
guard users against collusion by a light-weight entropy-based trust evaluation approach. Our
prototype implementation on the Android platform shows that STAMP is low-cost in terms
of computational and storage resources. Extensive simulation experiments show that our
entropy-based trust model is able to achieve high collusion detection accuracy.
2. IEEE 2016: Detecting Malicious Facebook Applications.
Abstract: With 20 million installs a day, third-party apps are a major reason for the
popularity and addictiveness of Facebook. Unfortunately, hackers have realized the potential
of using apps for spreading malware and spam. The problem is already significant, as we find
that at least 13% of apps in our dataset are malicious. So far, the research community has
focused on detecting malicious posts and campaigns. In this paper, we ask the question:
Given a Facebook application, can we determine if it is malicious? Our key contribution is in
developing FRAppE-Facebook's Rigorous Application Evaluator-arguably the first tool
focused on detecting malicious apps on Facebook. To develop FRAppE, we use information
gathered by observing the posting behavior of 111K Facebook apps seen across 2.2 million
users on Facebook. First, we identify a set of features that help us distinguish malicious apps
from benign ones. For example, we find that malicious apps often share names with other
2. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
apps, and they typically request fewer permissions than benign apps. Second, leveraging
these distinguishing features, we show that FRAppE can detect malicious apps with 99.5%
accuracy, with no false positives and a high true positive rate (95.9%). Finally, we explore
the ecosystem of malicious Facebook apps and identify mechanisms that these apps use to
propagate. Interestingly, we find that many apps collude and support each other; in our
dataset, we find 1584 apps enabling the viral propagation of 3723 other apps through their
posts. Long term, we see FRAppE as a step toward creating an independent watchdog for app
assessment and ranking, so as to warn Facebook users before installing apps.
3. IEEE 2016: Toward Optimum Crowdsensing Coverage with Guaranteed
Performance
Abstract: Mobile crowdsensing networks have emerged to show elegant data collection
capability in loosely cooperative network. However, in the sense of coverage quality,
marginal works have considered the efficient (less participants) and effec-tive (more
coverage) designs for mobile crowdsensing network we investigate the optimal coverage
problem in distributed crowdsensing networks. In that, the sensing quality and the
information delivery are jointly considered. Different from the conventional coverage
problem, ours only select a subset of mobile users, so as to maximize the crowdsensing
coverage with limited budget. We formulate our concerns as an optimal crowdsensing
coverage problem, and prove its NP-completeness. In tackling this difficulty, we also prove
the sub modular property in our problem. Leveraging the favorable property in sub modular
optimization, we present the greedy algorithm with approximation ratio O(√k),where is the
number of selected users. Such that the information delivery and sensing coverage ratio could
be guaranteed. Finally, we make extensive evaluations for the proposed scheme, with trace-
driven tests. Evaluation results show that the proposed scheme could outperform the random
selection by 2×with a random walk model, and over 3×with real trace data, in terms of
crowdsensing coverage. Besides, the proposed scheme achieves near optimal solution
comparing with the brute-force search results.
3. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
4. IEEE 2016: PRISM: Privacy-aware Interest Sharing and Matching in Mobile
Social Networks
Abstract: In a profile matchmaking application of mobile social networks, users need to
reveal their interests to each other in order to find the common interests. A malicious user
may harm a user by knowing his personal information. Therefore, mutual interests need to be
found in a privacy preserving manner. In this paper, we propose an efficient privacy
protection and interests sharing protocol referred to as Privacy-aware Interest Sharing and
Matching (PRISM). PRISM enables users to discover mutual interests without revealing their
interests. Unlike existing approaches, PRISM does not require revealing the interests to a
trusted server. Moreover, the protocol considers attacking scenarios that have not been
addressed previously and provides an efficient solution. The inherent mechanism reveals any
cheating attempt by a malicious user. PRISM also proposes the procedure to eliminate Sybil
attacks. We analyze the security of PRISM against both passive and active attacks. Through
implementation, we also present a detailed analysis of the performance of PRISM and
compare it with existing approaches. The results show the effectiveness of PRISM without
any significant performance degradation.
5. IEEE 2016: JOKER: A Novel Opportunistic Routing Protocol
Abstract: The increase in multimedia services has put energy saving on the top of current
demands for mobile devices. Unfortunately, batteries’ lifetime has not been as extended as it
would be desirable. For that reason, reducing energy consumption in every task performed by
these devices is crucial. In this work, a novel opportunistic routing protocol, called JOKER,
is introduced. This proposal presents novelties in both the candidate selection and
coordination phases, which permit increasing the performance of the network supporting
multimedia traffic as well as enhancing the nodes’ energy efficiency. JOKER is compared in
different-nature test-benches with BATMAN routing protocol, showing its superiority in
supporting a demanding service such as video-streaming in terms of QoE, while achieving a
power draining reduction in routing tasks.
4. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
6. IEEE 2016: Software Defined Networking with Pseudonym Systems for Secure
Vehicular Clouds
Abstract: The vehicular cloud is a promising new paradigm-m where vehicular networking
and mobile cloud computing are elaborately integrated to enhance the quality of vehicular
information services. Pseudonym is a resource for vehicles to protect their location privacy,
which should be efficiently utilized to secure vehicular clouds. However, only a few ex-isting
architectures of pseudonym systems take flexibility and efficiency into consideration, thus
leading to potential threats to location privacy. In this paper, we exploit software-defined
networking technology to significantly extend the flexibility and programmability for
pseudonym management in vehicular clouds. We propose a software-defined pseudonym
system where the distributed pseudonym pools are promptly scheduled and elastically
managed in a hierarchical manner. In order to decrease the system overhead due to the cost
of inter-pool communications, we leverage the two-sided matching theory to formulate and
solve the pseudonym resource scheduling. We conducted extensive simulations based on the
real map of San Francisco. Numerical results indicate that the proposed software-defined
pseudonym system significantly improves the pseudonym resource utilization, and
meanwhile, effectively enhances the vehicles’ location privacy by raising their entropy.
7. IEEE 2016: An Enhanced Available Bandwidth Estimation Technique for an End-
to-End Network Path
Abstract: This paper presents a unique probing scheme, a rate adjustment algorithm, and a
modified excursion detection algorithm (EDA) for estimating the available bandwidth
(ABW) of an end-to-end network path more accurately and less intrusively. The proposed
algorithm is based on the well known concept of self-induced congestion and it features a
unique probing train structure in which there is a region where packets are sampled more
frequently than in other regions. This high-density region enables our algorithm to find the
turning point more accurately. When the dynamic ABW is outside of this region, we readjust
the lower rate and upper rate of the packet stream to fit the dynamic ABW into that region.
We appropriately adjust the range between the lower rate and the upper rate using spread
5. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
factors, which enables us to keep the number of packets low and we are thus able to measure
the ABW less intrusively. Finally, to detect the ABW from the one-way queuing delay, we
present a modified EDA from PathChirps’ original EDA to better deal with sudden increase
and decrease in queuing delays due to cross traffic burstiness. For the experiments, an
Android OS-based device was used to measure the ABW over a commercial 4G/LTE mobile
network of a Japanese mobile operator, as well as real test bed measurements were conducted
over fixed and WLAN network. Simulations and experimental results show that our
algorithm can achieve ABW estimations in real time and outperforms other state-of-the-art
measurement algorithms in terms of accuracy, intrusiveness, and convergence time.
8. IEEE 2016: Privacy-Preserving Location Sharing Services for Social Networks
Abstract: A common functionality of many location-based social networking applications is
a location sharing service that allows a group of friends to share their locations. With a
potentially untrusted server, such allocation sharing service may threaten the privacy of
users. Existing solutions for Privacy-Preserving Location Sharing Services (PPLSS) require a
trusted third party that has access to the exact location of all users in the system or rely on
expensive algorithms or protocols in terms of computational or communication overhead.
Other solutions can only provide approximate query answers. To overcome these limitations,
we propose a new encryption notion, called Order-Retrievable Encryption (ORE), for PPLSS
for social networking applications. The distinguishing characteristics of our PPLSS are that it
(1) allows a group of friends to share their exact locations without the need of any third party
or leaking any location information to any server or users outside the group, (2) achieves low
computational and communication cost by allowing users to receive the exact location of
their friends without requiring any direct communication between users or multiple rounds of
communication between a user and a server, (3) provides efficient query processing by
designing an index structure for our ORE scheme, (4) supports dynamic location updates,
and (5) provides personalized privacy protection within a group of friends by specifying a
maximum distance where a user is willing to be located by his/her friends. Experimental
results show that the computational and communication cost of our PPLSS is much better
than the state-of-the-art solution.
6. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
9. IEEE 2016: Authenticated Key Exchange Protocols for Parallel Network File
Systems
Abstract: We study the problem of key establishment for secure many-to-many
communications. The problem is inspired by the proliferation of large-scale
distributed file systems supporting parallel access to multiple storage devices. Our work
focuses on the current Internet standard for such file systems, i.e., parallel
Network File System (pNFS), which makes use of Kerberos to
establish parallel session keys between clients and storage devices. Our review of the existing
Kerberos-based protocol shows that it has a number of limitations: (i) a metadata server
facilitating key exchange between the clients and the storage devices has heavy workload
that restricts the scalability of the protocol; (ii) the protocol does not provide forward
secrecy; (iii) the metadata server generates itself all the session keys that are used between
the clients and storage devices, and this inherently leads to key escrow. In this paper, we
propose a variety of authenticated key exchange protocols that are designed to address the
above issues. We show that our protocols are capable of reducing up to approximately 54
percent of the workload of the metadata server and concurrently supporting forward secrecy
and escrow-freeness. All this requires only a small fraction of increased computation
overhead at the client.
10. IEEE 2016: SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-
Web Interfaces
Abstract: As deep web grows at a very fast pace, there has been increased interest in
techniques that help efficiently locate deep-web interfaces. However, due to the large volume
of web resources and the dynamic nature of deep web, achieving wide coverage and high
efficiency is a challenging issue. We propose a two-stage framework, namely SmartCrawler,
for efficient harvesting deep web interfaces. In the first stage, SmartCrawler performs site-
based searching for center pages with the help of search engines, avoiding visiting a large
number of pages. To achieve more accurate results for a focused crawl, SmartCrawler ranks
websites to prioritize highly relevant ones for a given topic. In the second
7. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
stage, SmartCrawler achieves fast in-site searching by excavating most relevant links with an
adaptive link-ranking. To eliminate bias on visiting some highly relevant links in
hidden web directories, we design a link tree data structure to achieve wider coverage for a
website. Our experimental results on a set of representative domains show the agility and
accuracy of our proposed crawler framework, which efficiently retrieves deep-
web interfaces from large-scale sites and achieves higher harvest rates than other crawlers.
11. IEEE 2015: JAMMY: a Distributed and Self-Adaptive Solution against Selective
Jamming Attack in TDMA WSNs
Abstract: Time Division Multiple Access (TDMA) is often used in Wireless Sensor
Networks (WSNs), especially for critical applications, as it provides high energy efficiency,
guaranteed bandwidth, bounded and predictable latency, and absence of collisions.
However, TDMA is vulnerable to selective jamming attacks. In TDMA transmission, slots
are typically pre-allocated to sensor nodes, and each slot is used by the same node for a
number of consecutive super frames. Hence, an adversary could thwart a victim node’s
communication by simply jamming its slot(s). Such attack turns out to be effective, energy
efficient, and extremely difficult to detect. In this paper, we present JAMMY,
a distributed and dynamicsolution to selective jamming in TDMA-based WSNs. Unlike
traditional approaches, JAMMY changes the slot utilization pattern at every super frame,
thus making it unpredictable to the adversary. JAMMY is decentralized, as sensor nodes
determine the next slot utilization pattern in a distributed and autonomous way. Results from
performance analysis of the proposed solution show that JAMMY introduces negligible
overhead yet allows multiple nodes to join the network, in a limited number of super frames.
12. IEEE 2015: Distortion-Aware Concurrent Multipath Transfer for Mobile Video
Streaming in Heterogeneous Wireless Networks
Abstract: The massive proliferation of wireless infrastructures with complementary
characteristics prompts the bandwidth aggregation for Concurrent Multipath Transfer (CMT)
over heterogeneous access networks. Stream Control Transmission Protocol (SCTP) is the
standard transport-layer solution to enable CMT in multi homed communication
8. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
environments. However, delivering high-quality streaming video with the existing CMT
solutions still remains problematic due to the stringent quality of service (QoS) requirements
and path asymmetry in heterogeneous wireless networks. In this paper, we advance the state
of the art by introducing video distortion into the decision process of multipath data transfer.
The proposed distortion-aware concurrent multipath transfer (CMT-DA) solution includes
three phases: 1) per-path status estimation and congestion control; 2) quality-
optimal video flow rate allocation; 3) delay and loss controlled data retransmission. The term
`flow rate allocation' indicates dynamically picking appropriate access networks and
assigning the transmission rates. We analytically formulate the data distribution over multiple
communication paths to minimize the end-to-end video distortion and derive the solution
based on the utility maximization theory. The performance of the proposed CMT-DA is
evaluated through extensive semi-physical emulations in Exata involving
H.264 video streaming. Experimental results show that CMT-DA outperforms the reference
schemes in terms of video peak signal-to-noise ratio (PSNR), good put, and inter-packet
delay.
13.IEEE 2015: Cost-Effective Authentic and Anonymous Data Sharing with Forward
Security
Abstract: Data sharing has never been easier with the advances of cloud computing, and an
accurate analysis on the shared data provides an array of benefits to both the society and
individuals. Data sharing with a large number of participants must take into account several
issues, including efficiency, data integrity and privacy of data owner. Ring signature is a
promising candidate to construct an anonymous and authentic data sharing system. It allows
a data owner to anonymously authenticate his data which can be put into the cloud for
storage or analysis purpose. Yet the costly certificate verification in the traditional public key
infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. Identity-
based (ID-based) ring signature, which eliminates the process of certificate verification, can
be used instead. In this paper, we further enhance the security of ID-based ring signature by
providing forward security: If a secret key of any user has been compromised, all previous
generated signatures that include this user still remain valid. This property is especially
9. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
important to any large scale data sharing system, as it is impossible to ask all data owners to
re authenticate their data even if a secret key of one single user has been compromised. We
provide a concrete and efficient instantiation of our scheme, prove its security and provide an
implementation to show its practicality.
14.IEEE 2015: SHARP: Secured Hierarchical Anonymous Routing Protocol for
MANETs
Abstract: Mobile ad-hoc network (MANET) is one of the developing fields for research and
development of wireless network. MANETs are self-organizing, infrastructure less,
independent, dynamic topology based, open and decentralized networks. This is an ideal
choice for uses such as communication and data sharing. Due to the open and decentralized
nature of the network the nodes can join or leave the network as they wish. There is no
centralized authority to maintain the membership of nodes in the network.
In MANETs security is the major concern in applications such as communication and data
sharing. These are so many chances of different types of attacks due to self- organizing
property of MANETs. Malicious attacker may try to attack the data packets by tracing
the route. They may try to find the source and destination through different types
attacks. MANETs are vulnerable to malicious attackers that target to damage and analyze
data and traffic analysis by communication eavesdropping or
attacking routing protocols. Anonymous routing protocols are used by MANETs that hides
the identity of nodes as well as routes from outside observers. In MANETs anonymity means
identity and location anonymity of data sources and destinations as well as route anonymity.
However existing anonymous routing protocols have significantly high cost, which worsens
the resource constraint problem in MANETs. This paper
proposes Secured Hierarchical Anonymous Routing Protocol (SHARP) based on
cluster routing. SHARP offers anonymity to source, destination, and routes.
Theoretically SHARP achieves better anonymity protection compared to
other anonymous routing protocols.
10. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
15. IEEE 2015: CStream: Neighborhood Bandwidth Aggregation for Better Video
Streaming
Abstract: Despite the popularity of watching videos online, challenges still remain in video
streaming in many scenarios. Limited home broadband and mobile phone 3G bandwidths
mean many users stream videos at compromised quality. To provide additional bandwidth
for streaming, we propose CStream, a system that aggregates bandwidth from multiple
cooperating users in a neighborhood environment for better video streaming. CStream
exploits the fact that wireless devices have multiple network interfaces and connects
cooperating users with a wireless ad-hoc network to aggregate their unused downlink Inter-
net bandwidth. CStream dynamically generates a streaming plan to stream a single video
using multiple connections, continuously adapting to changes in the neighborhood and
variations in the available band- width. CStream is developed and evaluated on a test bed of
computers, allowing for a detailed, controlled evaluation of performance. Analysis of the
results shows a linear increase in throughput over single- connection streaming and
improved video quality as the number of cooperating users in a neighborhood increase.
16. IEEE 2015: The Mason Test: A Defense Against Sybil Attacks in Wireless Networks
Without Trusted Authorities
Abstract: Wireless networks are vulnerable to Sybil attacks, in which a malicious node
poses as many identities in order to gain disproportionate influence. Many defenses based on
spatial variability of wireless channels exist, but depend either on detailed, multi-tap channel
estimation-something not exposed on commodity 802.11 devices-or valid RSSI observations
from multiple trusted sources, e.g., corporate access points-something not directly available
in ad hoc and delay-tolerant networks with potentially malicious neighbors. We extend these
techniques to be practical for wireless ad hoc networks of commodity 802.11 devices.
Specifically, we propose two efficient methods for separating the valid RSSI observations of
behaving nodes from those falsified by malicious participants. Further, we note that prior
11. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
signal print methods are easily defeated by mobile attackers and develop an appropriate
challenge-response defense. Finally, we present the Mason test, the first implementation of
these techniques for ad hoc and delay-tolerant networks of commodity 802.11 devices. We
illustrate its performance in several real-world scenarios.
17. IEEE 2015: Passive IP Traceback: Disclosing the Locations of IP Spoofers From
Path Backscatter
Abstract: It is long known attackers may use forged source IP address to conceal their
real locations. To capture the spoofers, a number of IP traceback mechanisms have been
proposed. However, due to the challenges of deployment, there has been not a widely
adopted IP traceback solution, at least at the Internet level. As a result, the mist on
the locations of spoofers has never been dissipated till now. This paper
proposes passive IP traceback (PIT) that bypasses the deployment difficulties of IP traceback
techniques. PIT investigates Internet Control Message Protocol error messages (named path
backscatter) triggered by spoofing traffic, and tracks the spoofers based on public available
information (e.g., topology). In this way, PIT can find the spoofers without any deployment
requirement. This paper illustrates the causes, collection, and the statistical results
on path backscatter, demonstrates the processes and effectiveness of PIT, and shows the
captured locations of spoofers through applying PIT on the path backscatter data set. These
results can help further reveal IP spoofing, which has been studied for long but never well
understood. Though PIT cannot work in all the spoofing attacks, it may be the most useful
mechanism to trace spoofers before an Internet-level traceback system has been deployed in
real.
18. IEEE 2015: Resource Allocation for Energy Efficiency Optimization in
Heterogeneous Networks
Abstract: Heterogeneous network (HetNet) deployment is considered a de facto solution for
meeting the ever increasing mobile traffic demand. However, excessive power usage in
such networks is a critical issue, particularly for mobile operators. Characterizing the
fundamental energy efficiency (EE) performance of HetNets is therefore important for the
12. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
design of green wireless systems. In this paper, we address the EE optimization problem for
downlink two-tier HetNets comprised of a single macro-cell and multiple pico-cells.
Considering a heterogeneous real-time and non-real-time traffic, transmit be am forming
design and power allocation policies are jointly considered in order to optimize the
system energy efficiency. The EE resource allocation problem under consideration is a mixed
combinatorial and non-convex optimization problem, which is extremely difficult to solve. In
order to reduce the computational complexity, we decompose the original problem with
multiple inequality constraints into multiple optimization problems with single inequality
constraint. For the latter problem, a two-layer resource allocation algorithm is proposed
based on the quasiconcavity property of EE. Simulation results confirm the theoretical
findings and demonstrate that the proposed resource allocation algorithm can efficiently
approach the optimal EE.
19. IEEE 2015: A Distributed Three-Hop Routing Protocol to Increase the Capacity of
Hybrid Wireless Networks
Abstract: Hybrid wireless networks combining the advantages of both mobile ad-
hoc networks and infrastructure wireless networks have been receiving increased attention
due to their ultra-high performance. An efficient data routing protocol is important in
such networks for high network capacity and scalability. However, most routing protocols for
these networks simply combine the ad-hoc transmission mode with the cellular transmission
mode, which inherits the drawbacks of ad-hoc transmission. This paper presents
a Distributed Three-hop Routing protocol (DTR) for hybrid wireless networks. To take full
advantage of the widespread base stations, DTR divides a message data stream into segments
and transmits the segments in a distributed manner. It makes full spatial reuse of a system via
its high speed ad-hoc interface and alleviates mobile gateway congestion via its cellular
interface. Furthermore, sending segments to a number of base stations
simultaneously increases throughput and makes full use of widespread base stations. In
addition, DTR significantly reduces overhead due to short path lengths and the elimination
of route discovery and maintenance. DTR also has a congestion control algorithm to avoid
overloading base stations. Theoretical analysis and simulation results show the superiority of
13. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
DTR in comparison with other routing protocols in terms of throughput capacity, scalability,
and mobility resilience. The results also show the effectiveness of the congestion control
algorithm in balancing the load between base stations.
20. IEEE 2015: A Computational Dynamic Trust Model for User Authorization
Abstract: Development of authorization mechanisms for secure information access by a
large community of users in an open environment is an important problem in the ever-
growing Internet world. In this paper we propose
a computational dynamic trust model for user authorization, rooted in findings from social
science. Unlike most existing computational trust models,
this model distinguishes trusting belief in integrity from that in competence in different
contexts and accounts for subjectivity in the evaluation of a particular trustee by different
thrusters. Simulation studies were conducted to compare the performance of the proposed
integrity belief model with other trust models from the literature for different user behavior
patterns. Experiments show that the proposed model achieves higher performance than other
models especially in predicting the behavior of unstable users.
21. IEEE 2015: Generating Searchable Public-Key Ciphertexts with Hidden Structures
for Fast Keyword Search
Abstract: Existing semantically secure public-key searchable encryption schemes
take search time linear with the total number of the ciphertexts. This makes retrieval from
large-scale databases prohibitive. To alleviate this problem, this paper
proposes searchable public-key ciphertexts with hidden structures (SPCHS)
for keyword search as fast as possible without sacrificing semantic security of the encrypted
keywords. In SPCHS, all keyword-searchable ciphertexts are structured by hidden relations,
and with the search trapdoor corresponding to a keyword, the minimum information of the
relations is disclosed to a search algorithm as the guidance to find all
matching ciphertexts efficiently. We construct an SPCHS scheme from scratch in which
14. JAVA IEEE 2016-15 Networking Projects
Ph: 9845252155 ; 7676768124 Email: adritsolutions@gmail.com
ADRIT SOLUTIONS
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
the ciphertexts have a hidden star-like structure. We prove our scheme to be semantically
secure in the random oracle (RO) model. The search complexity of our scheme is dependent
on the actual number of the ciphertexts containing the queried keyword, rather than the
number of all ciphertexts. Finally, we present a generic SPCHS construction from
anonymous identity-based encryption and collision-free full-identity malleable identity-
based key encapsulation mechanism (IBKEM) with anonymity. We illustrate two collision-
free full-identity malleable IBKEM instances, which are semantically secure and anonymous,
respectively, in the RO and standard models. The latter instance enables us to construct an
SPCHS scheme with semantic security in the standard model.
22. IEEE 2015: A Lightweight Secure Scheme for Detecting Provenance Forgery and
Packet DropAttacks in Wireless Sensor Networks
Abstract: Large-scale sensor networks are deployed in numerous application domains, and
the data they collect are used in decision-making for critical infrastructures. Data are
streamed from multiple sources through intermediate processing nodes that aggregate
information. A malicious adversary may introduce additional nodes in the network or
compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct
decision-making. Data provenance represents a key factor in evaluating the trustworthiness
of sensor data. Provenance management for sensor networks introduces several challenging
requirements, such as low energy and bandwidth consumption, efficient storage
and secure transmission. In this paper, we propose a novel lightweight scheme to securely
transmit provenance for sensor data. The proposed technique relies on in-packet Bloom
filters to encode provenance. We introduce efficient mechanisms for provenance verification
and reconstruction at the base station. In addition, we extend
the secure provenance scheme with functionality to detect packet drop attacks staged by
malicious data forwarding nodes. We evaluate the proposed technique both analytically and
empirically, and the results prove the effectiveness and efficiency of
the lightweightsecure provenance scheme in detecting packet forgery and loss attacks.