Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ […]
A Novel Anti phishing framework based on visual cryptography
With the advent of internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites […]
Query Access Assurance in Outsourced Databases
Query execution assurance is an important concept in defeating lazy servers in the database as a service model. We show that extending query execution assurance to outsourced databases with multiple data owners is highly inefficient. To cope with lazy servers in the distributed setting, we propose query access assurance (Qaa) that focuses on IO-bound queries. […]
Expert Discovery and Interactions in Mixed Service-Oriented Systems
Web-based collaborations and processes have become essential in today’s business environments. Such processes typically span interactions between people and services across globally distributed companies. Web services and SOA are the defacto technology to implement compositions of humans and services. The increasing complexity of compositions and the distribution of people and services require adaptive and context-aware […]
Separable Reversible Data Hiding in Encrypted Image
This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some […]
DCS: Distributed Asynchronous Clock Synchronization in Delay Tolerant Networks
In this paper, we propose a distributed asynchronous clock synchronization (DCS) protocol for Delay Tolerant Networks (DTNs). Different from existing clock synchronization protocols, the proposed DCS protocol can achieve global clock synchronization among mobile nodes within the network over asynchronous and intermittent connections with long delays. Convergence of the clock values can be reached by […]
Capacity of Data Collection in Arbitrary Wireless Sensor Networks
Data collection is a fundamental function provided by wireless sensor networks. How to efficiently collect sensing data from all sensor nodes is critical to the performance of sensor networks. In this paper, we aim to understand the theoretical limits of data collection in a TDMA-based sensor network in terms of possible and achievable maximum capacity. […]
Using Dependency Structures for Prioritisation of Functional Test Suites
Test case prioritisation is the process of ordering the execution of test cases to achieve a certain goal, such as increasing the rate of fault detection. Increasing the rate of fault detection can provide earlier feedback to system developers, improving fault fixing activity and ultimately software delivery. Many existing test case prioritisation techniques consider that […]
Best Project Center in Trichy, IEEE Project Center trichy, N0 1 Project Center in Trichy, Final Year Projects
IEEE 2012 / IEEE 2013 / IEEE 2014 / IEEE 2015 SEABIRDS SOLUTION is one of the leading Research & Development Centre in trichy and chennai. We offer you the wide range of technical training in both software and hardware. Latest news for the Students who seeking for their final year projects, realtime projects, realtime […]
Information Theoretic Aspects of Users Activity in a Wyner-Like Cellular Model
We address an application of multiuser information theory to the study of the uplink of a communication system with randomly activated users. We first assume that all the messages are jointly decoded by a multicell processor. Then, we relax this hypothesis and study the network under the assumption that the decoding of the message of […]
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 28
- Next Page »