RECENT studies have shown that users migrating to the cloud consider security as the most important factor. A recent Cloud Security Alliance (CSA) survey shows that among all security issues, abuse and nefarious use of cloud computing is considered as the top security threat, in which attackers can exploit vulnerabilities in clouds and utilize cloud […]
Enhanced Adaptive Acknowledgment for Mobile Ad hoc Network
Natural mobility and scalability, wireless networks are always preferred since the first day of their invention. Owing to the improved technology and reduced costs, wireless networks have gained much more preferences over wired networks in the past few decades. Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes equipped with both a wireless […]
PPDA techniques for security multiparty computation
PRIVACY and security, particularly maintaining confidentiality of data, have become a challenging issue with advances in information and communication technology. The ability to communicate and share data has many benefits, and the idea of an omniscient data source carries great value to research and building accurate data analysis models. For example, for credit card companies […]
IBSDDS:Access control and security schemes for Distributed Network
CLOUD computing provides users with a convenient mechanism to manage their personal files with the notion called database-as-a-service (DAS). In DAS schemes, a user can outsource his encrypted files to untrusted proxy servers. Proxy servers can perform some functions on the outsourced ciphertexts without knowing anything about the original files. This technique has not been […]
Information Brokering System for healthcare service
Along with the explosion of information collected by organizations in many realms ranging from business to government agencies, there is an increasing need for inter-organizational information sharing to facilitate extensive collaboration. While many efforts have been devoted to reconcile data heterogeneity and provide interoperability, the problem of balancing peer autonomy and system coalition is still […]
Node localization in mobile sensor networks in Noisy Environments
WIRELESS sensor networks (WSNs) are increasingly a part of the modern landscape. Disciplines as diverse as volcanic eruption prediction and disaster response benefit from the addition of sensing and networking. A common requirement of many wireless sensor network systems is localization, where deployed nodes in a network discover their positions. smaller networks covering small areas, […]
TOA model for Mobile Tracking in Wireless sensor and Mobile sensor Networks
Wireless sensor networks have found rapidly growing applications in areas such as automated data collection, surveillance, and environmental monitoring. One important use of sensor networks is the tracking of a mobile target (point source) by the network. Mobile target tracking has a number of practical applications, including robotic navigation, search-rescue, wildlife monitoring, and autonomous surveillance. […]
VMISO links for multihop wireless network
SPACE-TIME communication is a technique that leverages the spatial and temporal variations of the channel to significantly enhance the performance of wireless networks. This communication paradigm can be realized using multiple antenna element arrays where the antenna elements are separated sufficiently (of the order of the wavelength of the carrier used) such that the channel […]
DPMFP: Feature Partitions based document clustering
This paper proposes a DPMFP method for document clustering. This paper attempt to group documents into an optimal number of clusters while the number of clusters K is discovered automatically. Develop a Dirichlet Process Mixture (DPM) model to partition documents. There are two algorithms to infer DPM parameters, in particular, the variational inference algorithm and […]
Retrieve Content From Remote Servers Via Uplink query processing
THE processing and storage capabilities of mobile consumer devices are becoming increasingly powerful. A gamut of new mobile applications has thus emerged for providing a better quality of experience for the end users. A class of such applications commonly referred to as mobile augmented reality includes ones that enable delivery of content in response to […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 12
- Next Page »