http://WWW.FINALYEARPROJECTS.NET
http://WWW.FINALYEARPROJECTS.NET

Checking delivery availability...

background-sm
Search
3

Updates found with 'users location'

Page  1 1

Updates found with 'users location'

ANDROID PROJECT ABSTRACT 2016-2017 PRIVACY-PRESERVING LOCATION SHARING SERVICES FOR SOCIAL NETWORKS ABSTRACT:A common functionality of many location-based social networking applications is a location sharing service that allows a group of friends to share their locations. With a potentially untrusted server, such a location sharing service may threaten the privacy of users. Existing solutions for Privacy-Preserving Location Sharing Services (PPLSS) require a trusted third party that has access to the exact location of all users in the system or rely on expensive algorithms or protocols in terms of computational or communication overhead. Other solutions can only provide approximate query answers. To overcome these limitations, we propose a new encryption notion, called Order-Retrievable Encryption (ORE), for PPLSS for social networking applications. The distinguishing characteristics of our PPLSS are that it (1) allows a group of friends to share their exact locations without the need of any third party or leaking any location information to any server or users outside the group, (2) achieves low computational and communication cost by allowing users to receive the exact location of their friends without requiring any direct communication between users or multiple rounds of communication between a user and a server, (3) provides efficient query processing by designing an index structure for our ORE scheme, (4) supports dynamic location updates, and (5) provides personalized privacy protection within a group of friends by specifying a maximum distance where a user is willing to be located by his/her friends. Experimental results show that the computational and communication cost of our PPLSS is much better than the state-of-the-art solution.
Send Enquiry
Read More
IEEE 2016 -2017 BIG DATA ANDROID DOTNET JAVA TITLESBIG DATA1. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce.ss2. Self-Healing in Mobile Networks with Big Data.ANDROID1. An Exploration of Geographic Authentication Schemes.2. Intelligent Hands Free Speech based SMS System on Android.3. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords.4. Privacy-Preserving Location Sharing Services for Social Networks.5. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones.6. A Shoulder Surfing Resistant Graphical Authentication System.7. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies.8. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users.9. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions..NET1. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing.2. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing3. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing4. CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal5. Cloud workflow scheduling with deadlines and time slot availability6. Dynamic and Public Auditing with Fair Arbitration for Cloud Data7. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems8. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates9. Identity-Based Encryption with Cloud Revocation Authority and Its Applications10. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud11. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection12. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud13. Providing User Security Guarantees in Public Infrastructure Clouds14. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys15. Reversible Data Hiding in Encrypted Images by Reversible Image Transformation16. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage17. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption18. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps19. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis20. A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets DetectionJAVA1. A Locality Sensitive Low-Rank Model for Image Tag Completion2. A Shoulder Surfing Resistant Graphical Authentication System3. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments4. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search5. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage6. Mining User-Aware Rare Sequential Topic Patterns in Document Streams7. Mitigating Cross-Site Scripting Attacks with a Content Security Policy8. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy9. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases10. SecRBAC: Secure data in the Clouds11. Tag Based Image Search by Social Re-rankingCLOUD COMPUTING1. Cost Minimization for Rule Caching in Software Defined Networking.2. Performance Enhancement of High-Availability Seamless Redundancy (HSR) Networks Using OpenFlow.3. Data Plane and Control Architectures for 5G Transport Networks.4. HBD: Towards Efficient Reactive Rule Dispatching in Software-Defined Networks.5. SDN-based Application Framework for Wireless Sensor and Actor Networks.6. Geo-Social Distance-based Data Dissemination for Socially Aware Networking.7. An Open-Source Wireless Mesh Networking Module for Environmental Monitoring.8. Hybrid IP/SDN networking: open implementation and experiment management tools.9. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges.10. Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System.NETWORK SECUIRTY1. Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing.DATA MINING1. Systematic Determination of Discrepancies Across Transient Stability Software Packages.2. Identification of Type 2 Diabetes Risk Factors Using Phenotypes Consisting of Anthropometry and Triglycerides based on Machine Learning.3. Teaching Network Security With IP Darkspace Data.4. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection.5. Mining High Utility Patterns in One Phase without Generating Candidates.6. An Improved String-Searching Algorithm and Its Application in Component Security Testing.
Send Enquiry
Read More
ANDROID PROJECT ABSTRACT 2016-2017 UNDERSTANDING SMARTPHONE SENSOR AND APP DATA FOR ENHANCING THE SECURITY OF SECRET QUESTIONS ABSTRACT:Many web applications provide secondary authentication methods, i.e., secret questions (or password recovery questions), to reset the account password when a user’s login fails. However, the answers to many such secret questions can be easily guessed by an acquaintance or exposed to a stranger that has access to public online tools (e.g., online social networks); moreover, a user may forget her/his answers long after creating the secret questions. Today’s prevalence of smartphones has granted us new opportunities to observe and understand how the personal data collected by smartphone sensors and appscan help create personalized secret questions without violating the users’ privacy concerns. In this paper, we present a Secret-Question based Authentication system, called “Secret-QA”, that creates a set of secret questions on basic of people’s smartphone usage. We develop a prototype on Android smartphones, and evaluate the security of the secret questions by asking the acquaintance/stranger who participate in our user study to guess the answers with and without the help of online tools; meanwhile, we observe the questions’ reliability by asking participants to answer their own questions. Our experimental results reveal that the secret questions related to motion sensors, calendar, app installment, and part of legacy appease history (e.g., phone calls) have the best memorability for users as well as the highest robustness to attacks.
Send Enquiry
Read More
CFD (Computational fluid dynamics) TITLES1. Flow control over airfoils using different shaped dimples2. Analysis of flow field across blunt fin with dimples –experimentation3. Aerodynamic characteristic and flow pattern on dimples structure of a sphere4. Numerical flow simulation for aircraft5. Analysis of surface augmentation of airfoil sections via flow visualization techniques6. Experimental and numerical investigations of a high performance co-flow jet airfoil7. Modelling & implementation of aerodynamic zero-lift drag into adapdt8. Cfd analysis on the main-rotor blade of a scale helicopter model using overset meshing9. Investigation of different airfoils on outer sections of large rotor blades10. Analysis of foils and wings operating at low reynolds numbers11. A computational study of the clap and fling aerodynamic mechanism12. Aeroelastic analysis of aircraft with control surfaces using cfd effects of winglets on a first-generation jet transport wing13. Aerodynamic analysis of the use of multi-winglets in light aircrafts14. Drag analysis of an aircraft wing model with and without bird feather like winglet15. Aerodynamic analysis of a blended-wing-body aircraft configuration16. Drag reduction in aircraft model using elliptical winglet17. Experimental investigation on the effect of multi-winglets18. Aerodynamic analysis of multi-winglets for low speed aircraft19. Aerodynamic efficiency study of modern spiroid winglets near-field tip vortex behind a swept wing model20. Analytic and experimental investigation of three-winglets21. Aerodynamics of wingtip sails22. Performance analysis of a wing with multiple winglets23. Cfd analysis of winglets at low subsonic flow24. The design of winglets for low-speed aircraft25. Design of multiple winglets to improve turning and soaring characteristics of angelo d’arrigo’s hangglider26. Numerical study of wingtip shed vorticity reduction by wing boundary layer control27. Numerical simulation of missile28. Heat transfer studies on blunt body at hypersonic speeds29. Simulation of flow over a wedge30. Design and develop a vortex generator based on boundary layer theory31. Designing and simulating flow across axisymmetric inlet32. Flow inside a vortex tube 33. Horizontal tail analysis (2-seat amphibious airplane)34. Analysis of the z-wing configuration35. Numerical analysis of injectors in rocket propellant36. Design and analysis of ramjet engine37. Cfd analysis of thrust vector control in nozzle38. Numerical investigation of aero spike nozzle39. Aerodynamic design study of ground vehicles40. Cfd analyses of ship hull forms41. Cfd prediction of loads on marine structures42. Design and analysis of a radial turbine with back swept blaring43. Evaluation of cfd sub-models for the intake manifold port flow analysis44. A vehicle body drags analysis using computational fluid dynamics45. Cfd calculation of convective heat transfer coefficients and validation46. A study of computational fluid dynamics applied to room air flow47. Cfd analysis of airflow and temperature distribution in buildings48. Assessment of turbulence modeling for cfd 49. Cfd analysis of diffuser50. Cfd analysis of engine valve 51. Nozzle design optimization for to reduce noise for turbo jet engine.52. Air and fuel flow interaction in combustion chamber for various injector locations53. Cfd investigation of airflow on a santro zing car by using fluent54. Cfd analysis of rocket nozzle55. Cfd analysis of supersonic exhaust in a scramjet engine56. aerodynamic design for bus/car vehicle57. Cfd analysis of exhaust manifold58. Cfd analysis of centrifugal fan59. Cfd analysis of intake manifold in si engines60. Cfd modeling of the automobile catalytic converter61. Cfd analysis of fluid flow and heat transfer in a single tube-fin arrangement of an automotive radiator62. Computational flow field analysis of a vertical axis wind turbine63. Cfd analysis of mixed flow pump impeller64. Cfd analysis of flow through venture meter to determine the coefficient of discharge65. Design improvements on mixed flow pumps by means of computational fluid dynamics66. Turbulent flow simulation in kaplan draft tube67. Flow analysis of marine propeller68. Design and analysis of globe valve as control valve using cfd software69. Numerical analysis of wax melting70. Conjugate heat transfer analysis in electronics devices
Send Enquiry
Read More
Page 1 1