Dynamic Query Forms for Database Queries

Dynamic Query Forms for Database Queries Technology Used: Java/J2EE Modern scientific databases and web databases maintain large and heterogeneous data. These real-world databases contain over hundreds or even thousands of relations and attributes. Traditional predefined query forms are not able to satisfy various ad-hoc queries from users on those databases. This work proposes DQF, a novel database query form interface, which is able to dynamically generate query forms. The essence of DQF is to capture a user’s preference and rank query form components, assisting him/her to make decisions. The generation…

Read More

A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments

A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments Caching valid regions of spatial queries at mobile clients is effective in reducing the number of queries submitted by mobile clients and query load on the server. However, mobile clients suffer from longer waiting time for the server to compute valid regions. A proxy-based approach is proposed to continuous nearest-neighbor (NN) and window queries. The proxy creates estimated valid regions (EVRs) for mobile clients by exploiting spatial and temporal locality of spatial queries. For NN queries, two new algorithms…

Read More

Dynamic personalized recommendation on sparse data

Dynamic personalized recommendation on sparse data Technology Used: Java/J2EE Recommendation techniques are very important in the fields of E-commerce and other Web-based services. One of the main difficulties is dynamically providing high-quality recommendation on sparse data. A novel dynamic personalized recommendation algorithm is proposed, in which information contained in both ratings and profile contents are utilized by exploring latent relations between ratings, a set of dynamic features are designed to describe user preferences in multiple phases, and finally a recommendation is made by adaptively weighting the features. Experimental results on…

Read More

Security and Privacy-Enhancing Multicloud Architectures

Security and Privacy-Enhancing Multicloud Architectures DEPENDABLE AND SECURE COMPUTING, JULY/AUGUST 2013 Technology Used: Java/J2EE Security challenges are still among the biggest obstacles when considering the adoption of cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues, the cloud paradigm comes with a new set of unique features, which open the path toward novel security approaches, techniques, and architectures. This paper provides a survey on the achievable security merits by making use of multiple…

Read More

Cross-domain privacy-preserving cooperative firewall optimization

Cross-domain privacy-preserving cooperative firewall optimization Technology Used: Java Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the packet based on its policy. Optimizing firewall policies is crucial for improving network performance. Prior work on firewall optimization focuses on either intra-firewall or inter-firewall optimization within one administrative domain where the privacy of firewall policies is not a concern. Inter-firewall optimization is considered across administrative domains for the first time. The key technical…

Read More

Bidirectional Multi-Constrained Routing Algorithms

Bidirectional Multi-Constrained Routing Algorithms Technology Used: Java QoS routing plays a critical role in providing QoS support in the Internet. Most existing QoS routing algorithms employ the strategy of unidirectional search in route selection. Bidirectional search has been recognized as an effective strategy for fast route acquisition in identifying the shortest path connecting a pair of nodes. However, its efficiency has not been well established in the context of route selection subject to multiple additive constraints, which is in general NP-Complete. To employ bidirectional search to support efficient QoS routing…

Read More

Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes

Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes INFORMATION FORENSICS AND SECURITY, JANUARY 2013 Technology Used: Java Wireless sensor networks are prone to node misbehavior arising from tampering by an adversary (Byzantine attack), or due to other factors such as node failure resulting from hardware or software degradation. In this paper, we consider the problem of decentralized detection in wireless sensor networks in the presence of one or more classes of misbehaving nodes. Binary hypothesis testing is considered where the honest nodes transmit their binary…

Read More

Extracting spread-spectrum hidden data from digital media

Extracting spread-spectrum hidden data from digital media Technology Used: Dot Net The problem of extracting blindly data embedded over a wide band in a spectrum (transform) domain of a digital medium image is considered. To develop a novel multicarrier/ signature iterative generalized least-squares (M-IGLS) core procedure to seek unknown data hidden in hosts via multicarrier spread-spectrum embedding. Neither the original host nor the embedding carriers are assumed available. Experimental studies on images show that the developed algorithm can achieve recovery probability of error close to what may be attained with…

Read More

Dynamic Multilevel Priority Packet Scheduling Scheme for Wireless Sensor Network

Dynamic Multilevel Priority Packet Scheduling Scheme for Wireless Sensor Network Scheduling different types of packets, such as realtime and non-real-time data packets, at sensor nodes with resource constraints in Wireless Sensor Networks (WSN) is of vital importance to reduce sensors energy consumptions and end-to-end data transmission delays. Most of the existing packet-scheduling mechanisms of WSN use First Come First Served (FCFS), non-preemptive priority and preemptive priority scheduling algorithms. These algorithms incur a high processing overhead and long end-to-end data transmission delay due to the FCFS concept, starvation of high priority…

Read More

CloudMOV: Cloud-based mobile social TV

CloudMOV: cloud-based mobile social TV Technology Used: Java/J2EE The rapidly increasing power of personal mobile devices is providing much richer contents and social interactions to users on the move. This trend however is throttled by the limited battery lifetime of mobile devices and unstable wireless connectivity, making the highest possible quality of service experienced by mobile users not feasible. The recent cloud computing technology, with its rich resources to compensate for the limitations of mobile devices and connections, can potentially provide an ideal platform to support the desired mobile services.…

Read More