Abstract: Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the health care cost. Unfortunately, it also poses a serious risk to both clients’privacy and intellectual property of […]
.NET MINI PROJECTS
FUZZY KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING
Abstract: As Cloud Computing winds up predominant, more touchy data are being unified into the cloud. Albeit conventional accessible encryption plans enable a client to safely seek over encoded information through watchwords and specifically recover documents of intrigue, these strategies bolster just correct catchphrase look. In this paper, out of the blue, we formalize and […]
Toll plaza Management
The online toll booth is a web-based application that can provide all the information related to toll plazas and the passenger checks in either online or on a mobile device and pays the amount, then he/she will be provided by a receipt. With this receipt, he/she can leave the toll booth without waiting for any […]
Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
Abstract: This paper centers around quantized channel state data (CSI) criticism for downlink organizes MIMO frameworks. In particular, we propose to quantize and criticism the CSI of a subset of BSs, specifically the input set. Our investigation uncovers the tradeoff between better impedance relief with vast criticism set and high CSI quantization accuracy with little […]
Knowledge-Based Interactive Postmining of Association Rules Using Ontologies(2010)
Abstract: In Data Mining, the helpfulness of affiliation rules is emphatically constrained by the colossal measure of conveyed rules. To conquer this downside, a few strategies were proposed in the writing, for example, itemset compact portrayals, repetition diminishment, and postprocessing. In this manner, it is critical to assist the leader with a proficient postprocessing venture […]
Efficient audit service outsourcing for data integrity in clouds(2012)
Abstract: Cloud-based outsourced stockpiling assuages the customer’s weight for capacity administration and upkeep by giving a similar ease, versatile, area autonomous stage. Notwithstanding, the way that customers never again have physical ownership of information shows that they are confronting a possibly considerable hazard for absent or tainted information. To keep away from the security dangers, […]
Latency Equalization as a New Network Service Primitive(2012)
Abstract: Multiparty intelligent system applications, for example, remotely coordinating, arrange for the game, and internet exchanging are picking up fame. Notwithstanding end-to-end dormancy limits, these applications require that the defer distinction among numerous customers of the administration is limited for a decent intuitive ordeal. We propose a Latency EQualization (LEQ) benefit, which adjusts the apparent […]
Robust Face-Name Graph Matching for Movie Character Identification(2012)
Abstract: Programmed confront distinguishing proof of characters in motion pictures has drawn noteworthy research interests and prompted numerous intriguing applications. It is a testing issue because of the tremendous variety in the presence of each character. Albeit existing techniques show promising outcomes in clean condition, the exhibitions are restricted in complex motion picture scenes because […]
Robustness of Offline Signature Verification Based on Gray Level Features(2012)
Abstract: A few papers have as of late showed up in the writing which propose pseudo-dynamic highlights for programmed static wrote mark to check in light of the utilization of dim level esteem from signature stroke pixels. Great outcomes have been acquired utilizing pivot invariant uniform neighborhood paired examples LBP in addition to LBP and […]
Scalable Learning of Collective Behavior(2012)
Abstract: This investigation of aggregate conduct is to see how people carry on in a long range interpersonal communication condition. Seas of information produced by online networking like Facebook, Twitter, Flicker, and YouTube show openings and difficulties to consider aggregate conduct on a vast scale. In this work, we intend to figure out how to […]