Java Projects
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing JAVA
Cloud computing is an Internet-based computing pattern through which shared resources are provided..
A New Algorithm for Inferring User Search Goals with Feedback Sessions
Individual wellbeing record is a developing patient-driven model of wellbeing data trade, which is r..
A new Approach of Detecting Internet Worm
Internet worm means separate malware computer programs that repeated itself and in order to spread o..
A new ECG beat clustering method based on kernelized fuzzy c-means and hybrid ant colony optimization for continuous domains
The kernelized fuzzy c-means algorithm uses kernel methods to improve the clustering performance of ..
A New Human Identification Method Sclera Recognition
In this paper, we propose a new concept for human identification (ID): sclera recognition. The blood..
A New Intelligence-Based Approach for Computer-Aided Diagnosis of Dengue Fever
Dengue viruses are members of the Flaviviridae, transmitted principally in a cycle involving humans ..
A New Methodology for Mining Frequent Item sets on Temporal Data
Temporal data contain time-stamping information that affects the results of data mining. Traditiona..
A New Multi-path Routing Methodology Based on Logit Type Assignment
In networking, Lots of routing mechanisms in the Internet network have been based on single-shortest..
A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast
Addressing key management in mobile multicast communication is currently a booming topic due to the ..
A novel approach to generate MCQs from domain ontology Considering DL semantics and open world assumption
Ontologies are structures, used for knowledge representation, which model domain knowledge in the fo..
A NOVEL CONTINUOUS BLOOD PRESSURE ESTIMATION APPROACH BASED ON DATA MINING TECHNIQUES
Continuous blood pressure (BP) estimation using pulse transit time (PTT) is a promising method for ..
A Novel Cost Based Model for Data Repairing
Integrity constraint based data repairing is an iterative process consisting of two parts: detect an..
A Novel Encryption Based Framework for Cloud Databases
Over the last decade, cloud computing has emerged as a popular model for distributed, efficient and ..
A Novel Internet of Things-centric Framework to Mine Malicious Frequent Patterns
There are a number of research challenges associated with Internet of Things (IoT) security, and on..