http://WWW.FINALYEARPROJECTS.NET
http://WWW.FINALYEARPROJECTS.NET

Checking delivery availability...

background-sm
Search
3

Updates found with 'v2v communication'

Page  1 1

Updates found with 'v2v communication'

ANDROID PROJECT ABSTRACT 2016-2017 PRIVACY-PRESERVING LOCATION SHARING SERVICES FOR SOCIAL NETWORKS ABSTRACT:A common functionality of many location-based social networking applications is a location sharing service that allows a group of friends to share their locations. With a potentially untrusted server, such a location sharing service may threaten the privacy of users. Existing solutions for Privacy-Preserving Location Sharing Services (PPLSS) require a trusted third party that has access to the exact location of all users in the system or rely on expensive algorithms or protocols in terms of computational or communication overhead. Other solutions can only provide approximate query answers. To overcome these limitations, we propose a new encryption notion, called Order-Retrievable Encryption (ORE), for PPLSS for social networking applications. The distinguishing characteristics of our PPLSS are that it (1) allows a group of friends to share their exact locations without the need of any third party or leaking any location information to any server or users outside the group, (2) achieves low computational and communication cost by allowing users to receive the exact location of their friends without requiring any direct communication between users or multiple rounds of communication between a user and a server, (3) provides efficient query processing by designing an index structure for our ORE scheme, (4) supports dynamic location updates, and (5) provides personalized privacy protection within a group of friends by specifying a maximum distance where a user is willing to be located by his/her friends. Experimental results show that the computational and communication cost of our PPLSS is much better than the state-of-the-art solution.
Send Enquiry
Read More
ANDROID PROJECT ABSTRACT 2016-2017 SBVLC: SECURE BARCODE-BASED VISIBLE LIGHT COMMUNICATION FOR SMARTPHONES ABSTRACT:2D barcodes have enjoyed a significant penetration rate in mobile applications. This is largely due to the extremely low Barrier to adoption – almost every camera-enabled smartphone can scan 2D barcodes. As an alternative to NFC technology, 2DBarcodes have been increasingly used for security-sensitive mobile applications including mobile payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. Due to the visual Nature, 2D barcodes are subject to eavesdropping when they are displayed on the smartphone screens. On the other hand, the Fundamental design principles of 2D barcodes make it difficult to add security features. In this paper, we propose SBVLC - a secure System for barcode-based visible light communication (VLC) between smartphones. We formally analyze the security of SBVLC based On geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen View angles and leveraging user-induced motions. We then develop three secure data exchange schemes that encode information in Barcode streams. These schemes are useful in many security-sensitive mobile applications including private information sharing, Secure device pairing, and contactless payment. SBVLC is evaluated through extensive experiments on both Android and ios Smartphones.
Send Enquiry
Read More
IEEE 2016 -2017 Embedded System Projects TitlesS.No Project Title Code1. Coexistence of ZigBee-Based WBAN and Wi-Fi for Health Telemonitoring Systems Wireless2. A Novel Wireless Multifunctional Electronic Current Transformer based on ZigBee-based Communication Wireless3. Configurable ZigBee-based control system for people with multiple disabilities in smart homes Wireless4. ZigBee network system for observing operating activities of work vehicles Wireless5. Interference-Mitigated ZigBee-Based Advanced Metering Infrastructure Wireless6. A Mobile ZigBee Module in a Traffic Control System ` Wireless7. Energy Efficient Outdoor Light Monitoring and Control Architecture Using Embedded System Wireless8. Low-power wearable ECG monitoring system for multiple-patient remote monitoring Wireless9. Energy-Efficient Intelligent Street Lighting System Using Traffic-Adaptive Control Wireless10. Development of a distributed disaster data and human life sign probe system Wireless11. Design and implementation of a home automation system for smart grid applications Wireless12. Milk products monitoring system with arm processor for early detection of microbial activity ARM13. Micro grid demonstration gateway for players communication and load monitoring and management Wireless14. WiFACT -- Wireless Fingerprinting Automated Continuous Training Wireless15. Lightweight Mashup Middleware for Coal Mine Safety Monitoring and Control Automation Wireless16. A smart wearable system for sudden infant death syndrome monitoring General17. Exoskeleton robots for upper-limb rehabilitation Robotics18. Wearable Camera- and Accelerometer-Based Fall Detection on Portable Devices GSM & GPS19. Innovation in Underwater Robots: Biologically Inspired Swimming Snake Robots Robotics20. GPS based autonomous vehicle navigation and control system GSM & GPS21. Real-Time Driving Monitor System: Combined Cloud Database with GPS IoT22. AgriSys: A smart and ubiquitous controlled-environment agriculture system IoT23. Building Smart Cities Applications using IoT andCloud-based Architectures IoT24. An IoT-based system for collision detection on guardrails IoT25. A vision-based teleoperation method for a robotic arm with 4 degrees of freedom Robotics26. Gesture control of drone using a motion controller Robotics27. Development of the Mobile Robot with a Robot Arm Robotics28. Milk products monitoring system with arm processor for early detection of microbial activity ARM29. Controller Area Network Assisted Grid Synchronization of a Microgrid With Renewable Energy Sources and Storage Electrical30. A Real-Time Embedded System for Monitoring of Cargo Vehicles, Using Controller Area Network (CAN) CAN31. Wireless biosensing network for drivers' health monitoring Biomedical32. Android4Auto: A proposal for integration of Android in vehicle infotainment systems Android33. A pulse measurement and data management system based on Arduino platform and Android device Android34. Remote control and instrumentation of Android devices Android35. “AUTOBOOK” The Messaging Machines (Using GSM and Arduino) Arduino36. Tracking and Theft Prevention System for Two Wheeler Using GSM and GPS GSM & GPS37. Bank Locker Security System Using RFID and GSM Technology GSM38. Design of Entrapment Escalation using GSM for Elevators GSM39. Distribution Line Fault Detection & GSM Module Based Fault Signaling System Electrical40. GSM & PIR Based Advanced Antitheft Security System Security 41. LPG Gas Weight and Leakage Detection System Using GSM GSM42. Android Based Women Tracking System Using GPS and GSM GSM & GPS43. Trespass Prevention System Using IOT IoT44. Automatic Vehicle Accident Detection and Rescue System GSM & GPS45. Design and Implementation of Integrated Mobile Operated Remote Vehicle IoT46. A Wearable Device for Continuous Detection and Screening of Epilepsy during Daily Life IoT47. Review of Automatic Detection and control of Disease for Grape Field Gen48. Environmental Condition Monitoring System for the Industries Gen49. Security Management Access Control System Gen50. Design and Development of Embedded based System for Monitoring Industrial and Environmental Parameters for Analyzing the Health of Human beings Gen51. Visual Surveillance Using Absolute Difference Motion Detection System Raspberry pi52. Automatic Irrigation System Using Internet of Things IoT53. Design of Embedded Irrigation System by Using WSN Wireless54. Vehicle Accident Prevention Using Assistant Braking System Gen55. Smart Transport Database Management System Gen56. Accident Alert Using ZIGBEE and GPS Wireless57. Controlling the Home Appliances Remotely Through Web Application Using ZIGBEE Wireless58. An optimized solar traffic control and alert system using wireless sensor networks Wireless59. Biometric Recognition Technique for ATM System Security60. Light Weight Access Control System for Constrained IOT Devices IoT61. Design of Prototype Model for Home Automation Using Wireless Sensor Networks Wireless62. Automated Sensor Network For Monitoring and Detection of Impurity In Drinking Water System General63. Automated Smart Trolley with Smart Billing Using Arduino Gene64. Embedded Automatic Vehicle Control System Using Voice Recognition On ARM 7 Processor ARM65. Embedded Voice Controlled Computer For Visually Impaired and Physically Disabled People Using Arm Processor ARM66. Implementation of Embedded Web Server Using TCP/IP Protocol with Raspberry PI Raspberry PI67. Designing of Cleaning Robot Robot68. An Analysis of Network-Based Control System Using Controller Area Network (CAN) Protocol CAN69. Identify the Deterioration in Pipe by Using Wheel Operated Robot Robot70. RFID -G Based Navigation System For Visually Impaired To Work at Industry Gen71. New Generation ATM Terminal Services NFC72. A Wireless Sensor Interface for the Quantification of Tremor Using Off the Shelf Components Wireless73. Design and Implementation of Low-Cost SMS Based Monitoring System of Distribution Transformers GSM74. An Integrated Cloud-Based Smart Home Management System with Community Hierarchy Automation75. Home Outlet and LED Array Lamp Controlled by a Smartphone with a Hand Gesture Recognition Gesture76. Low-power wearable ECG monitoring system for multiple-patient remote monitoring Bio-medical77. Smart Real-Time Healthcare Monitoring and Tracking System using GSM/GPS Technologies Bio-medical78. The Design of Building Fire Monitoring System Based on ZigBee-WiFi Networks Wireless
Send Enquiry
Read More
IEEE 2016 - 2017 Vlsi Titles1. Analyzing the Effect of Clock Jitter on Self-Oscillating Sigma Delta Modulators2. Hypergraph Based Minimum Arborescence Algorithm for the Optimization and Reoptimization of Multiple Constant Multiplications.3. A High-Throughput Energy-Efficient Implementation of Successive Cancellation Decoder for Polar Codes Using Combinational Logic4. Adaptive Multibit Crosstalk-Aware Error Control Coding Scheme for On-Chip Communication5. A Method to Design Single Error Correction Codes With Fast Decoding for a Subset of Critical Bits6. Multiple Constant Multiplication Algorithm for High-Speed and Low-Power Design7. CORDIC II: A New Improved CORDIC Algorithm8. Low-Power Parallel Chien Search Architecture Using a Two-Step Approach9. Efficient Circuit for Parallel Bit Reversal .10. High-Speed and Energy-Efficient Carry Skip Adder Operating Under a Wide Range of Supply Voltage Levels11. Low-Cost High-Performance VLSI Architecture for Montgomery Modular Multiplication12. A High-Performance FIR Filter Architecture for Fixed and Reconfigurable Applications13. Efficient Dynamic Virtual Channel Organization and Architecture for NoC Systems14. Improving Nested Loop Pipelining on Coarse-Grained Reconfigurable Architectures15. One-Cycle Correction of Timing Errors in Pipelines With Standard Clocked Elements 16. Analytical SPICE-Compatible Model of Schottky-Barrier-Type GNRFETs With Performance Analysis17. A New Optimal Algorithm for Energy Saving in Embedded System With Multiple Sleep Modes18. A Novel Quantum-Dot Cellular Automata X-bit × 32-bit SRAM19. Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video Encoding20. Ultralow-Energy Variation-Aware Design: Adder Architecture Study21. SRAM-Based Unique Chip Identifier Techniques .22. Implementing Minimum-Energy-Point Systems With Adaptive Logic23. On Efficient Retiming of Fixed-Point Circuits24. Hardware and Energy-Efficient Stochastic LU Decomposition Scheme for MIMO Receivers25. Distributed Sensor Network-on-Chip for Performance Optimization of Soft-Error-Tolerant Multiprocessor System-on-Chip26. Concept, Design, and Implementation of Reconfigurable CORDIC27. A New CDMA Encoding/Decoding Method for on-Chip Communication Network
Send Enquiry
Read More
IEEE 2016 - 2017 VLSI Project Titles 1. Analyzing the Effect of Clock Jitter on Self-Oscillating Sigma Delta Modulators2. Hypergraph Based Minimum Arborescence Algorithm for the Optimization and Reoptimization of Multiple Constant Multiplications.3. A High-Throughput Energy-Efficient Implementation of Successive Cancellation Decoder for Polar Codes Using Combinational Logic4. Adaptive Multibit Crosstalk-Aware Error Control Coding Scheme for On-Chip Communication5. A Method to Design Single Error Correction Codes With Fast Decoding for a Subset of Critical Bits6. Multiple Constant Multiplication Algorithm for High-Speed and Low-Power Design7. CORDIC II: A New Improved CORDIC Algorithm8. Low-Power Parallel Chien Search Architecture Using a Two-Step Approach9. Efficient Circuit for Parallel Bit Reversal .10. High-Speed and Energy-Efficient Carry Skip Adder Operating Under a Wide Range of Supply Voltage Levels11. Low-Cost High-Performance VLSI Architecture for Montgomery Modular Multiplication12. A High-Performance FIR Filter Architecture for Fixed and Reconfigurable Applications13. Efficient Dynamic Virtual Channel Organization and Architecture for NoC Systems14. Improving Nested Loop Pipelining on Coarse-Grained Reconfigurable Architectures15. One-Cycle Correction of Timing Errors in Pipelines With Standard Clocked Elements 16. Analytical SPICE-Compatible Model of Schottky-Barrier-Type GNRFETs With Performance Analysis17. A New Optimal Algorithm for Energy Saving in Embedded System With Multiple Sleep Modes18. A Novel Quantum-Dot Cellular Automata X-bit × 32-bit SRAM19. Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video Encoding20. Ultralow-Energy Variation-Aware Design: Adder Architecture Study21. SRAM-Based Unique Chip Identifier Techniques .22. Implementing Minimum-Energy-Point Systems With Adaptive Logic23. On Efficient Retiming of Fixed-Point Circuits24. Hardware and Energy-Efficient Stochastic LU Decomposition Scheme for MIMO Receivers25. Distributed Sensor Network-on-Chip for Performance Optimization of Soft-Error-Tolerant Multiprocessor System-on-Chip26. Concept, Design, and Implementation of Reconfigurable CORDIC27. A New CDMA Encoding/Decoding Method for on-Chip Communication Network
Send Enquiry
Read More
CLOUD COMPUTING PROJECT ABSTRACT 2016-2017 SDN-BASED APPLICATION FRAMEWORK FOR WIRELESS SENSOR AND ACTOR NETWORKS ABSTRACT:As a promising platform for implementing various applications, a wireless sensor and actor network (WSAN) consists of many sensor and actor nodes that can cooperatively handle complex tasks. However, many issues, including nodes’ mobility, the heterogeneity of capacity, topology, and energy consumption, may bring severe challenges to efficient WSAN operation. Currently, the Software Defined Network (SDN) appears as a novel approach that is effective to manage and optimize networks in a programmable and centralized pattern. This paper studies the application framework and relevant methods for applying the SDN approach in a WSAN, with the objective of improving network’s efficiency and scalability. The details of the framework include a three-layer structure, the relevant system entities, the enhanced protocol stack, and the programmable message types for cooperative communication and task execution among WSAN nodes. Based on this framework, this paper explores the relevant challenges and mechanisms for effective system management from many aspects, including mobility, energy saving, reliability maintenance and topology construction. This paper also proposes an optimization method for scheduling decomposed tasks to relevant nodes, with an example implemented by the Genetic Algorithm. Next, this paper demonstrates the typical application scenarios, including military, industry, transportation, and environmental disaster monitoring. Moreover, an indoor application scenario and an outdoor application scenario are presented to demonstrate the application of the SDN-assisted communication handoff. Last, the future trends and technical challenges for SDN in WSAN are discussed.
Send Enquiry
Read More
IEEE 2016 -2017 BIG DATA ANDROID DOTNET JAVA TITLESBIG DATA1. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce.ss2. Self-Healing in Mobile Networks with Big Data.ANDROID1. An Exploration of Geographic Authentication Schemes.2. Intelligent Hands Free Speech based SMS System on Android.3. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords.4. Privacy-Preserving Location Sharing Services for Social Networks.5. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones.6. A Shoulder Surfing Resistant Graphical Authentication System.7. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies.8. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users.9. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions..NET1. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing.2. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing3. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing4. CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal5. Cloud workflow scheduling with deadlines and time slot availability6. Dynamic and Public Auditing with Fair Arbitration for Cloud Data7. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems8. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates9. Identity-Based Encryption with Cloud Revocation Authority and Its Applications10. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud11. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection12. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud13. Providing User Security Guarantees in Public Infrastructure Clouds14. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys15. Reversible Data Hiding in Encrypted Images by Reversible Image Transformation16. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage17. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption18. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps19. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis20. A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets DetectionJAVA1. A Locality Sensitive Low-Rank Model for Image Tag Completion2. A Shoulder Surfing Resistant Graphical Authentication System3. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments4. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search5. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage6. Mining User-Aware Rare Sequential Topic Patterns in Document Streams7. Mitigating Cross-Site Scripting Attacks with a Content Security Policy8. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy9. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases10. SecRBAC: Secure data in the Clouds11. Tag Based Image Search by Social Re-rankingCLOUD COMPUTING1. Cost Minimization for Rule Caching in Software Defined Networking.2. Performance Enhancement of High-Availability Seamless Redundancy (HSR) Networks Using OpenFlow.3. Data Plane and Control Architectures for 5G Transport Networks.4. HBD: Towards Efficient Reactive Rule Dispatching in Software-Defined Networks.5. SDN-based Application Framework for Wireless Sensor and Actor Networks.6. Geo-Social Distance-based Data Dissemination for Socially Aware Networking.7. An Open-Source Wireless Mesh Networking Module for Environmental Monitoring.8. Hybrid IP/SDN networking: open implementation and experiment management tools.9. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges.10. Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System.NETWORK SECUIRTY1. Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing.DATA MINING1. Systematic Determination of Discrepancies Across Transient Stability Software Packages.2. Identification of Type 2 Diabetes Risk Factors Using Phenotypes Consisting of Anthropometry and Triglycerides based on Machine Learning.3. Teaching Network Security With IP Darkspace Data.4. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection.5. Mining High Utility Patterns in One Phase without Generating Candidates.6. An Improved String-Searching Algorithm and Its Application in Component Security Testing.
Send Enquiry
Read More
Page 1 1