Load-Balancing Multipath Switching System with Flow Slice

Load-Balancing Multipath Switching System with Flow Slice Final year Projects | Real Time Projects | Ns2 Projects Load-Balancing Multipath Switching System with Flow Slice Multipath Switching systems (MPS) are intensely used in state-of-the-art core routers to provide terabit or even petabit switching capacity. One of the most intractable issues in designing MPS is how to load balance traffic across its multiple paths while not disturbing the intraflow packet orders. Previous packet-based solutions either suffer from delay penalties or lead to O(N2 ) hardware complexity, hence do not scale. Flow-based hashing…

Read More

SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency- projects SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency- projects Abstract With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving opportunistic computing framework,…

Read More

local broadcast algorithms in wireless ad hoc networks reducing the number of transmissions

local broadcast algorithms in wireless ad hoc networks reducing the number of transmissions There are two main approaches, static and dynamic, to broadcast algorithms in wireless ad hoc networks. In the static approach, local algorithms determine the status (forwarding/nonforwarding) of each node proactively based on local topology information and a globally known priority function. In this paper, we first show that local broadcast algorithms based on the static approach cannot achieve a good approximation factor to the optimum solution (an NP-hard problem). However, we show that a constant approximation factor…

Read More

Robust Face-Name Graph Matching for Movie Character Identification

Robust Face-Name Graph Matching for Movie Character Identification Abstract Automatic face identification of characters in movies has drawn significant research interests and led to many interesting applications. It is a challenging problem due to the huge variation in the appearance of each character. Although existing methods demonstrate promising results in clean environment, the performances are limited in complex movie scenes due to the noises generated during the face tracking and face clustering process. In this paper we present two schemes of global face-name matching based framework for robust character identification.…

Read More

Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption

Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption   Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues…

Read More

Cloud Data Production for MassesCloud Data Production for Masses

Cloud Data Production for Masses Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.  

Read More

Ensuring Distributed Accountability for Data Sharing in the Cloud

Ensuring Distributed Accountability for Data Sharing in the Cloud Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this…

Read More

Ranking Model Adaptation for Domain-Specific Search

Ranking Model Adaptation for Domain-Specific Search With the explosive emergence of vertical search domains, applying the broad-based ranking model directly to different domains is no longer desirable due to domain differences, while building a unique ranking model for each domain is both laborious for labeling data and time-consuming for training models. In this paper, we address these difficulties by proposing a regularization based algorithm called ranking adaptation SVM (RA-SVM), through which we can adapt an existing ranking model to a new domain, so that the amount of labeled data and…

Read More

Secure and Practical Outsourcing of Linear Programming in Cloud Computing

projects 2012 Secure and Practical Outsourcing of Linear Programming in Cloud Computing – 2011 Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Despite the tremendous benefits, security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when…

Read More

Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks

projects 2012 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks This article presents the design of a networked system for joint compression, rate control and error correction of video over resource-constrained embedded devices based on the theory of compressed sensing. The objective of this work is to design a cross-layer system that jointly controls the video encoding rate, the transmission rate, and the channel coding rate to maximize the received video quality. First, compressed sensing based video encoding for transmission over wireless multimedia sensor networks (WMSNs) is studied. It is…

Read More