Java Projects
A Privacy Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
Continuous authentication is mainly associated with the use of biometrics to guarantee that a resour..
A PRIVACY LEAKAGE UPPER BOUNDCONSTRAINT-BASED APPROACH FORCOST-EFFECTIVE PRIVACY PRESERVINGOF INTERMEDIATE DATA SETS IN CLOUD
AbstractCloud computing provides massive computation power and storage capacity which enable user..
A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes
The development of the Internet of Things (IoT) has made extraordinary progress in recent years in ..
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
Continuous authentication is mainly associated with the use of biometrics to guarantee that a resour..
A Privacy-Preserving Framework for Large-ScaleContent-Based Information Retrieval
We propose a privacy protection framework for large-scale content-based information retrieval. It o..
A Proactive Workflow Model for Healthcare Operation and Management
Advances in real-time location systems have enabled us to collect massive amounts of fine-grained se..
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
Cloud Computing arisen as a successful computing paradigm, because it allows hiring resources withou..
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
As an effective and efficient way to provide computing resources and services to customers on demand..
A Proxy-Based Architecture for Dynamic Discovery and Invocation of Web Services from Mobile Devices
The advancement in wireless technologies in general and mobile devices capabilities in particular, u..
A Recommendation System to Facilitate Business Process Modeling
A system that utilizes process recommendation technology to help design new business processes fro..
A Resource Allocation Scheme for Multiple Device-to-Device Multicasts in Cellular Networks
Device-to-Device (D2D) multicast communication is emerging as a practical solution to alleviate se..
A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks
The purpose of this study is to identify important reduced input features in building IDS that is co..
A Review on Mining Students’ Data for Performance Prediction
Education sector has witnessed sea change in its functioning. Today it is recognized as an industry ..
A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds
Cloud services act as storage center in the health sector which enables the exchange of EHR among th..
A Review Paper on Dengue Disease Forecasting Using Data Mining Techniques
Data Mining is a standout amongst the most comprehensively and rousing zones of research with the ..