ABSTRACT: In this project, we have the new approach for encryption of different file formats like text, image, audio and video with key wrapping is proposed. The binary data of a record is separated into an equal size with estimated blocks called as girds. The bit stream of each gird is taken and Square gird transposition is applied. A variable […]
.NET PROJECTS
.NET Project On A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
ABSTRACT: We focus on a two-tier sensor coordinate with the resource-rich master nodes at the upper tier and resource poor sensor nodes at the lower tier. Master nodes gather information from sensor nodes and answer the queries from the network proprietor. The reliance on mater nodes for information storage and query processing raises serious concerns […]
.NET Project On A Novel Anti Phishing Framework Based On Visual Cryptography
ABSTRACT: With the advent of the internet, different online attacks have been expanded and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get individual classified data, for example, passwords, Credit card data from unsuspecting victims to identifying theft, financial gain, and other fraudulent activities. Fake […]
.NET Project On Enforcing Secure And Privacy-Preserving Information Brokering In Distributed Information Sharing
ABSTRACT: Today’s organizations raise an expanding requirement for information sharing by means of on-demand access. Information brokering systems (IBS) have been proposed to associate large scale loosely federated data sources via a brokering overlay, in which the representatives settle on routing decisions to guide customer queries to the requesting data servers. Many existing IBSs expect […]
.NET Project On Automatic Detection Of Paroxysms In Eeg Signals Using Morphological Descriptors And artificial Neural Networks
ABSTRACT: The electroencephalogram (EEG) signal plays an important role in the diagnosis of epilepsy. The EEG recordings of the ambulatory recording system produce very lengthy information and the detection of the epileptic activity requires a time-consuming examination of the entire length of the EEG information by an expert. The traditional strategies for the investigation being […]
.NET Project On Passive IP Traceback Disclosing the Locations of IP Spoofers From Path
ABSTRACT: It has long known aggressors may utilize forged source IP address to conceal their real locations. To capture the spoofers, various IP traceback components have been proposed. Be that as it may, because of the challenges of deployment, there has been not a widely adopted IP traceback solution, at any rate at the Internet […]
.NET Project On Robust Correlation Of Encrypted Attack Traffic through Stepping Stones By Flow Watermarking
ABSTRACT: Network-based intruders seldom attack their victims directly from their own computer. Often, they stage their attacks through intermediate “stepping stones” in order to conceal their identity and origin. To distinguish the source of the attack behind the stepping stone(s), it is important to associate the incoming and outgoing flows or connections of a stepping […]
.NET Project On Resource Allocation for QoS Support in Wireless Mesh Network
ABSTRACT: Many next-generation applications, (for example, video flows) are likely going to have related minimum data rate requirements in order to ensure satisfactory quality as perceived by end-users. In this project, we develop a system to address the issue of maximizing the aggregate utility of traffic flows in a multi-hop wireless network, with constrains imposed both […]
.NET Project On Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information.
ABSTRACT: Community Question Answering (CQA) services have gained popularity over the past years. It not just enables community members to post and answer the question but also enables general clients to seek for data from a comprehensive set of well-answered question. In any case, existing cQA forums generally give only textual answers, which are not informative […]