K.L.N. College of Engineering Department of Computer Science & Engineering Subject Name: Project Work Batch Subject Code: CS6811

Size: px
Start display at page:

Download "K.L.N. College of Engineering Department of Computer Science & Engineering Subject Name: Project Work Batch Subject Code: CS6811"

Transcription

1 R.Aarrthy Mining Efficient query facet with Mrs. R. Kirubahari, C.Krishna Subhashini high clustering quality KLNCE/PRO// / Environment-Aware S.K.Anitha Ms.M.G.Bhagyalakshmi, Optimization Strategies for M.Janani Greening Cloud Application KLNCE/PRO// / O.S.Aravind babu P.Karuppusamy M.S. Arjune T.M.Darsan E.Ashtalakshmi V.Jamuna S.Fathima Afshana Harish kumar.r.r.v Ashwin.R.S K.M.Aswathaman R.S.Harish Kumar M.Durairaj Bavithra.M Kavitha Devi.M R.Birundha V.R.Hemalatha Improving Hadoop Performance using CJBT An efficient prediction of disease Using Significant Pattern mining in Data Exploration Health data specification and exchange on cloud environment using secure clinical document Simultaneous Virus Scanning on a Service in mobile and Cloud Services Protected data replication in cloud to improve security and performance Real-Time Traffic Light and Break Light Detection with Artificial Neural Networks(ANNs) Classifier EKASE: Enhanced Key Aggregate Searchable Encryption for multi-owners data sharing via cloud storage Mr. J. Sulthan Ali khan, Dr.P.R.Vijayalskshmi, Prof/ Mrs.S.S.Sarmila, Mr. D.Pravin Kumar, ASP Mr. B. Chandran Sekaran, Mrs. P. Velvizhi, AP(SG) Ms.S.Brindha, KLNCE/PRO// /003 KLNCE/PRO// /004 KLNCE/PRO// /005 KLNCE/PRO// /006 KLNCE/PRO// /007 KLNCE/PRO// /008 KLNCE/PRO// /009.2

2 /2/ J.B.G.Chaamuny G.Indhumathi K.Deepika M.S.Lakshmi Priya S.Dhaariny P.Krithika Devi K. Dhanusya Sree B. Iyswarya S.V.Hema S.Karthika M.J.Harshini S.Bharathy B.S.Kiruthikamai S.M.Kruthika E.Gayathri K.Gayathri Water Quality Monitoring System By Using Cost Efficient Sensors Micro-Cluster Formation Using Shared Density Graph Energy Efficient Clustering Using Pegasis In Wireless Sensor Networks Sentence Element Abstraction By Exploring Transh And Transr. A Secure Opportunistic Routing In Dtn Using Geographic Location Joint Design For Distributed Stable Routing And Channal Assisgnment Over Multihop And Multiflow In Mobile Ad Hoc Cognitive Network(Macnets) Opinion Based Quality Evaluation Using Social User s Context By Aspect Rating Scalable Algorithms To Identify Pattern Of Human-Centric Data From Smart Phones Ms.S.Brindha, Ms.V.Abinaya, Mrs. M.Raghini, AP(SG) Dr.P.R.Vijayalskshmi,Pro f/ Mrs. M.Raghini, AP(SG) Mrs.B.Buvaneswari, ASP Mrs. R. Kirubahari, Mr. B. Chandran Sekaran, KLNCE/PRO// /010 KLNCE/PRO// /011 KLNCE/PRO// /012 KLNCE/PRO// /013 KLNCE/PRO// /014 KLNCE/PRO// /015 KLNCE/PRO// /016 KLNCE/PRO// /017 3

3 /3/ S.No Register No. Name of the Students Title of the Project Supervisor Name Project Number Path Inference Access Control Lakshna T S For Acknowledgement In Malathi K R Neighbouring Node P.Dinesh kumar, KLNCE/PRO// / Madhankumar V Manikandan M Madhu Mathi K B Rashika V S Manisha G Rajeswari N Meena T M Nandhini G M Mohana Priya M Petchi K Muthu Kumarasamy S Robin Vinith S Muthu Priya D Nagajothi M Nagajothi C Nithya M Detection Of Ip Spoofing Attack In Interdomain Routing Decisions Optimal Routing Technique And Secure Communication In Vanet A Secure Erasure Code Based Cloud Storage System Using Proxy Re-Encrytion Trust Assessment Based On Reputation- Recommendation In Cloud Services Image Based Extraction By Private Stream Searching Algorithm Securing The Backpressure Algorithm Combining Cooperative Bait Detection Scheme Change Detection Using Deep Representation And Enhancement Analysis For Multispectral Imagery Enabling Multi Level Trusted Data Exchange Dr.R.Alageswaran,Prof/ Mr.D.Prabhu, Mrs.S.Venkatalakshmi, Mr.V.Bhaskar, ASP / KLNCE/PRO// /019 KLNCE/PRO// /020 KLNCE/PRO// /021 KLNCE/PRO// /022 Mrs. P. Velvizhi, AP(SG) KLNCE/PRO// /023 Mr. P. Prem Kumar, ASP Mr.B.M.Nagarajan, AP / Mrs.R.Delshi howsalya devi, AP KLNCE/PRO// /024 KLNCE/PRO// /025 KLNCE/PRO// /026 4

4 /4/ Adaptive Combination Of Relay Prarthana R R Selection & Resource Allocation Rameesha A A Using Localization Algorithm Mr.D.Prabhu AP KLNCE/PRO// / Prathishta S Rajeswari M Preethi S Prithvikha Roshini J G Priyanka M R Samira Basima B Priyanka N Sangavi N Data Processing With Delay Optimality Using Panda s Accelerator An Efficient Approach To Enhance Data Security In Cloud Storage Statistical Approach For Privacy Preservation In Wireless Medical Sensor Network Secure And Authorized De-Duplication Of Data In Cloud Dr.N.Lakshmi Narasimman,Prof/ Mr. J. Sulthan Ali khan, Dr.V.Akilandeswari, Mrs.G.Rajeswari, AP / KLNCE/PRO// /028 KLNCE/PRO// /029 KLNCE/PRO// /030 KLNCE/PRO// / Raghul K K Ramkumar N K S Sabarinath K S On Line Cloud Proffering Approach With Safety Unit Using Scrambled Technique Mrs.B.Buvaneswari, ASP KLNCE/PRO// / Rajasabitha R Sangeetha R Karthik J R Muralitharan G Petchimuthu@ Karthick M Routing Based On Wireless Sensor Network With Multiple Source Node Automatic Syntactics Key Phrase Retrieval For Multiple Languages Mr.P.Dinesh kumar, AP / Mr.G.Prem Paul, AP / KLNCE/PRO// /033 KLNCE/PRO// /034.5

5 /5/ Optimized Query Suggestion For G.Saranya Mrs.R.Lakshmi, ASP / Websearch With User Location T.Shanthini Awareness KLNCE/PRO// / C.G.Sathish Kumar R.Sriram R.Sivagurunathan E.Shahida Begum S.Swedha K.K.Shamini G.Shruthi M.V.H.SriVarshini R.Thirupurasundari C.Srividhya K.J.Sushmitha M.S,Subiksha S.Veeralakhsmi P.Yazhini S.Suriya P.S.Vishnu Kumar R.YashGoenka B.Susithra B.Umamaheswari A Novel Crack Detection Method On Concrete Bridges Filtering Of In Corporate Server Opportunistic Routing With Congestion Diversity In Wireless Adhoc Networks Reversible Data Hiding In Encrypted Image Secured Data Storage in Cloud using Two factor Security Mechanism Pedestrian Detection By Video Processing In Low Resolution Using Night Vision System Co-extracting Opinion Targets and Opinion words from online Reviews Neighbor Node discovery using Greedy algorithm for wireless sensor networks Dr.N.Lakshminarasimma n, Prof. Mrs.R.Lakshmi, ASP / Mrs.T.R.Vedhavathy, ASP Mrs.R.Delshi Howsalya Devi, AP Dr.V.Akilandeswari, Mr.R.Anandha Murugan, AP Mr.D.Pravinkumar, ASP / Mrs.T.R.Vedhavathy, ASP KLNCE/PRO// /036 KLNCE/PRO// /037 KLNCE/PRO// /038 KLNCE/PRO// /039 KLNCE/PRO// /040 KLNCE/PRO// /041 KLNCE/PRO// /042 KLNCE/PRO// /043 6

6 /6/ V.R.Swathi Authorized Person Identification Mr.R.Anandha Murugan, S.C.Vaishali From Live Video Stream For AP P.Vathsala Home Surveillance System KLNCE/PRO// / K.A.Tharun Kumar T.N.Viswanath K.R.Raghul S.V.Vaishnavi Devi M.K.Vishalini S.Revathi T.R.Varun Kumar T.J. Vishnu Lal B.R.Srivatshan S.Velmurugan Vishal Sreeram V.Samynathan Routine Information Core System using Greedy Algorithm for Location Based Search of Pharmaceuticals Indoor Map Generation Using Beacon GPS Enabled Staff Attendance and Deep Search Algorithm based Leave Application for Smart Office Common Wireless Network Access for automatic Home Systems Ms.M.G.Bhagyalakshmi, AP Dr.S.Miruna Joe Amali, Prof. Dr.R.Alagewaran, Prof. / Mr.J.Rajeshkumar, AP / KLNCE/PRO// /045 KLNCE/PRO// /046 KLNCE/PRO// /047 KLNCE/PRO// /048 Typist Cum Clerk (Sr.Gr.) Senior Librarian

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

Void main Technologies

Void main Technologies SNO TITLE Domain 1. A Hybrid Approach for Detecting Automated Spammers in Twitter Data mining 2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage 3. A Lightweight Secure

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE CLOUD COMPUTING WEB-SERVICES BASED DATABASE: SQL, MY-SQL, ORACLE JAVA - PROJECT TOPICS IEEE 2015 BASED 1 A Hybrid Cloud Approach for Secure Authorized Deduplication JCC1501 2 A Secure and Dynamic Multi-keyword

More information

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

IEEE PROJECTS ON EMBEDDED SYSTEMS

IEEE PROJECTS ON EMBEDDED SYSTEMS S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015-2016 DOT NET IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2015 DOT NET Project Titles Domain Lang/Year 1 JPD1501 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted

More information

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication NETWORKING 1. ITDNW01 Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social 2. ITDNW02 Congestion Control for Background Data Transfers With Minimal Delay Impact 3. ITDNW03 Transient

More information

DATA MINING. 3. ITDDM03 A Probabilistic Model of Social Working Memory for Information Retrieval in Social Interactions

DATA MINING. 3. ITDDM03 A Probabilistic Model of Social Working Memory for Information Retrieval in Social Interactions DATA MINING 1. ITDDM01 Reducing Uncertainty of Probabilistic Top-k Ranking via Pairwise Crowd sourcing 2. ITDDM02 An Approach for Building Efficient and Accurate Social Recommender Systems using Individual

More information

CSE / IT IEEE PROJECT LIST

CSE / IT IEEE PROJECT LIST CSE / IT IEEE 2014 PROJECT LIST DOMAIN: CLOUD COMPUTING DOT NET 1) A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud - 2)

More information

IEEE Project Titles

IEEE Project Titles www.chennaisunday.com PH:9566137117 IEEE Project Titles -2018 S.No Project Title Year CLOUD COMPUTING 1 A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud

More information

Next Steps in Data Mining. Sistemas de Apoio à Decisão Cláudia Antunes

Next Steps in Data Mining. Sistemas de Apoio à Decisão Cláudia Antunes Next Steps in Data Mining Sistemas de Apoio à Decisão Cláudia Antunes Temporal Data Mining Cláudia Antunes Data Mining Knowledge Discovery is the nontrivial extraction of implicit, previously unknown,

More information

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 2015-2016 JAVA IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2015 JAVA Project Titles Domain Lang/Year 1 JPJ1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 JPJ1502 A

More information

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely

More information

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS Nandhini P. 1 and Ravi G. 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College of

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information

Sl.No Project Title Year

Sl.No Project Title Year Sl.No Project Title Year WSN(Wireless Sensor ) 1 Distributed Topology Control With Lifetime Extension Based on Non-Cooperative Game for Wireless Sensor 2 Intercept Behavior Analysis of Industrial Wireless

More information

Elysium Technologies Private Limited::IEEE Final year Project

Elysium Technologies Private Limited::IEEE Final year Project Elysium Technologies Private Limited::IEEE Final year Project - o n t e n t s Data mining Transactions Rule Representation, Interchange, and Reasoning in Distributed, Heterogeneous Environments Defeasible

More information

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification

More information

JAVA PROJECTS LIST. S.No Title/Name of the Project Year. Mobile Computing

JAVA PROJECTS LIST. S.No Title/Name of the Project Year. Mobile Computing JAVA PROJECTS LIST S.No Title/Name of the Project Year Mobile Computing 1 Estimating Parameters of Multiple Heterogeneous Target Objects Using Composite Sensor Nodes IEEE 2 Protecting Location Privacy

More information

SECURING UNDERWATER WIRELESS COMMUNICATION NETWORK DEVELOPMENT OF A MOBILE EEG-BASED BIOMETRIC AUTHENTICATON SYSTEM

SECURING UNDERWATER WIRELESS COMMUNICATION NETWORK DEVELOPMENT OF A MOBILE EEG-BASED BIOMETRIC AUTHENTICATON SYSTEM List of Seminars SE 1 SE 2 SE 3 SE 4 SE 5 SE 6 SE 7 SE 8 SE 9 SE 10 SE 11 SE 12 SE 13 SE 14 SE 15 SE 16 SE 17 SE 18 SE 19 SE 20 SE 21 SE 22 SE 23 SE 24 SE 25 SMS ENCRYPTION Cloud Computing Learning A KEYLESS

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose

More information

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification 3.

More information

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B

More information

5g Use Cases. Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015

5g Use Cases. Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015 5g Use Cases Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015 BROADBAND EXPERIENCE EVERYWHERE, ANYTIME 5g USE CASES SMART VEHICLES, TRANSPORT & INFRASTRUCTURE MEDIA EVERYWHERE CRITICAL CONTROL OF

More information

World Wide Sensor Web

World Wide Sensor Web World Wide Sensor Web Wearable Personal Instrumentation Tarek F. Abdelzaher University of Illinois at Urbana Champaign Feasibility of Wearable Personal Instrumentation Miniaturization of computing devices

More information

A Geometric Stack for Location-Aware Networking. Marco Gruteser, Rich Martin WINLAB, Rutgers University

A Geometric Stack for Location-Aware Networking. Marco Gruteser, Rich Martin WINLAB, Rutgers University A Geometric Stack for Location-Aware Networking Marco Gruteser, Rich Martin WINLAB, Rutgers University Why Location-Aware Networking? The Revenge of Geography Low-cost localization Point-of-Interest Queries

More information

SRA A Strategic Research Agenda for Future Network Technologies

SRA A Strategic Research Agenda for Future Network Technologies SRA A Strategic Research Agenda for Future Network Technologies Rahim Tafazolli,University of Surrey ETSI Future Network Technologies ARCHITECTURE 26th 27th Sep 2011 Sophia Antipolis, France Background

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008 Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008 Prof. D. Raychaudhuri ray@winlab.rutgers.edu www.winlab.rutgers.edu 1 Introduction: The Promise of Wireless Everywhere

More information

An Algorithm for Dynamic SDN Controller in Data Centre Networks

An Algorithm for Dynamic SDN Controller in Data Centre Networks IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 04-08 www.iosrjen.org An Algorithm for Dynamic SDN Controller in Data Centre Networks Nirmala 1, Oliveruth 2, Varun 3 1

More information

Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions

Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions Siran Pavankumar(149344152) siranpavankumar@gmail.com Computer Science Department Seoul National

More information

Preface List of Acronyms

Preface List of Acronyms Contents Preface List of Acronyms xxi Chapter 1 Next Generation Wireless Technologies 1 1.1 Introduction 1 1.2 Wireless Networking Standardization Process 5 1.2.1 Wireless Personal Area Networks 5 1.2.2

More information

D B M G Data Base and Data Mining Group of Politecnico di Torino

D B M G Data Base and Data Mining Group of Politecnico di Torino DataBase and Data Mining Group of Data mining fundamentals Data Base and Data Mining Group of Data analysis Most companies own huge databases containing operational data textual documents experiment results

More information

Bloom Filter for Network Security Alex X. Liu & Haipeng Dai

Bloom Filter for Network Security Alex X. Liu & Haipeng Dai Bloom Filter for Network Security Alex X. Liu & Haipeng Dai haipengdai@nju.edu.cn 313 CS Building Department of Computer Science and Technology Nanjing University Bloom Filters Given a set S = {x 1,x 2,x

More information

NET M.TECH IEEE TITLES

NET M.TECH IEEE TITLES 2017 2018.NET M.TECH IEEE TITLES S.NO TITLES DOMAIN 1. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories 2. Securing Aggregate Queries For DNA Databases 3. Fast Phrase Search

More information

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2017-2018 JAVA IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2017-18 JAVA Project Titles Domain Lang/Year 1 JPJ1701 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Mrs.C.Sasirekha PERFORMANCE OF MIMO SYSTEM USING NEW BOONDS FOR MAXIMUM AND MINIMUM EIGEN VALUES KLNCE/PRO/ECE/ /001

Mrs.C.Sasirekha PERFORMANCE OF MIMO SYSTEM USING NEW BOONDS FOR MAXIMUM AND MINIMUM EIGEN VALUES KLNCE/PRO/ECE/ /001 1 910613106006 133035 L.ALAGU BHARATHI IMPROVING THE 910613106050 133009 G.LEKA KAMATCHI S.D.VANDHANA DEVI 910613106104 133128 PERFORMANCE OF MIMO SYSTEM USING NEW BOONDS FOR MAXIMUM AND MINIMUM EIGEN

More information

Database and Knowledge-Base Systems: Data Mining. Martin Ester

Database and Knowledge-Base Systems: Data Mining. Martin Ester Database and Knowledge-Base Systems: Data Mining Martin Ester Simon Fraser University School of Computing Science Graduate Course Spring 2006 CMPT 843, SFU, Martin Ester, 1-06 1 Introduction [Fayyad, Piatetsky-Shapiro

More information

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3 www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 May, 2014 Page No. 5594-5599 DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING

More information

Accelerating intelligence at the edge for embedded and IoT applications

Accelerating intelligence at the edge for embedded and IoT applications Accelerating intelligence at the edge for embedded and IoT applications Arm Tech Symposia 2017 Agenda The emergence of intelligence at the edge Requirements for intelligent edge computing IP and technologies

More information

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive

More information

IEEE networking projects

IEEE networking projects IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified

More information

USE CASES BROADBAND AND MEDIA EVERYWHERE SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES

USE CASES BROADBAND AND MEDIA EVERYWHERE SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES 5g Use Cases BROADBAND AND MEDIA EVERYWHERE 5g USE CASES SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES HUMAN MACHINE INTERACTION SENSOR NETWORKS

More information

Sybil Attack Detection and Prevention Using AODV in VANET

Sybil Attack Detection and Prevention Using AODV in VANET Sybil Attack Detection and Prevention Using in VANET Navneet 1, Rakesh Gill 2 1 M. Tech. Student, GITM, Bilaspur-Tauru Road, Gurgaon (Haryana) navneet_tehlan@yahoo.com 2 Asst. Prof., GITM, Bilaspur-Tauru

More information

CyLab Mobility Research Center. Martin Griss & Priya Narasimhan

CyLab Mobility Research Center. Martin Griss & Priya Narasimhan CyLab Mobility Research Center Martin Griss & Priya Narasimhan July 1, 2008 1 Mobility Research Summit Agenda 11.30 Lunch Welcome, introductions 12.00 Background, goals 12.30 Faculty presentations 2.00

More information

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan Vehicular Cloud Computing: A Survey Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan OUTLINE OF TOPICS INTRODUCETION AND MOTIVATION TWO-TIER VEHICULAR

More information

Challenges for Data Driven Systems

Challenges for Data Driven Systems Challenges for Data Driven Systems Eiko Yoneki University of Cambridge Computer Laboratory Data Centric Systems and Networking Emergence of Big Data Shift of Communication Paradigm From end-to-end to data

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity

More information

Broad Learning via Fusion of Heterogeneous Information

Broad Learning via Fusion of Heterogeneous Information Broad Learning via Fusion of Heterogeneous Information Philip S. Yu Distinguished Professor & Wexler Chair University of Illinois at Chicago Dean, Institute for Data Science Tsinghua University Big Data

More information

Smartphone-powered future

Smartphone-powered future Matt Grob EVP & Chief Technology Officer, Qualcomm Technologies, Inc. Smartphone-powered future @GrobMatt 1 Energy Enough to lift an adult several stories high Utility Replaces 6+ devices Power More computing

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Fog Computing. The scenario

Fog Computing. The scenario Università degli Studi di Roma Tor Vergata Dipartimento di Ingegneria Civile e Ingegneria Informatica Fog Computing Corso di Sistemi e Architetture per Big Data A.A. 2016/17 Valeria Cardellini The scenario

More information

Publishing CitiSense Data: Privacy Concerns and Remedies

Publishing CitiSense Data: Privacy Concerns and Remedies Publishing CitiSense Data: Privacy Concerns and Remedies Kapil Gupta Advisor : Prof. Bill Griswold 1 Location Based Services Great utility of location based services data traffic control, mobility management,

More information

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

Reliable and Efficient flooding Algorithm for Broadcasting in VANET Reliable and Efficient flooding Algorithm for Broadcasting in VANET Vinod Kumar*, Meenakshi Bansal Mtech Student YCOE,Talwandi Sabo(india), A.P. YCOE, Talwandi Sabo(india) Vinod_Sharma85@rediffmail.com,

More information

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS M Jansirani Research scholar Research Department of Computer Science Government Arts College (Autonomous),

More information

Contents PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1

Contents PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1 Preface xiii PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1 1 Princi ples of Cloud Computing Systems 3 1.1 Elastic Cloud Systems for Scalable Computing 3 1.1.1 Enabling Technologies for Cloud Computing

More information

The Programmable World Opportunities and Challenges

The Programmable World Opportunities and Challenges The Programmable World Opportunities and Challenges Guillaume Mascot Head of Government Relations APJ & India March 2017 1 Nokia 2016 Megatrends are bringing the programmable world Network, compute & storage

More information

Chapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al.

Chapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter 6: Distributed Systems: The Web Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter Outline Web as a distributed system Basic web architecture Content delivery networks

More information

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2 CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,

More information

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security A Brief Overview of Security & Privacy Issues 1 Topics to Be Covered Cloud computing RFID systems Bitcoin

More information

WeVe: When Smart Wearables Meet Intelligent Vehicles

WeVe: When Smart Wearables Meet Intelligent Vehicles WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet

More information

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security in Mobile Ad-hoc Networks. Wormhole Attacks Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,

More information

Embedded Systems Projects

Embedded Systems Projects Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro

More information

L2 - Internet of Things

L2 - Internet of Things UNIK4750 - Measurable Security for the Internet of Things L2 - Internet of Things György Kálmán, UiO/NTNU/mnemonic gyorgy.kalman@its.uio.no Josef Noll UiO/UNIK josef.noll@its.uio.no http://cwi.unik.no/wiki/unik4750,

More information

Homomorphic Encryption. By Raj Thimmiah

Homomorphic Encryption. By Raj Thimmiah Homomorphic Encryption By Raj Thimmiah Symmetric Key Encryption Symmetric Key Encryption Symmetric Key Encryption: XOR Gates XOR gates are the simplest way to implement symmetric key encryption XOR gates

More information

WEB APPLICATION. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

WEB APPLICATION. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System 2016-2017 APPLICATION Projects @ JP infotech S.NO Project Code 2016-2017 APPLICATION PROJECT Titles Type Coding Lang. WEB APPLICATION 1 JPJA1601 Airline Reservation System 2 JPJA1602 Building web applications

More information

Mobile Health Monitoring Based On New Power Management Approach

Mobile Health Monitoring Based On New Power Management Approach Mobile Health Monitoring Based On New Power Management Approach R.Kanimozhi 1, M.Suguna 2 Department of Information Technology, SNS College of Technology, Coimbatore, Tamilnadu, India 1, 2 ABSTRACT- Mobile

More information

Computer-based Tracking Protocols: Improving Communication between Databases

Computer-based Tracking Protocols: Improving Communication between Databases Computer-based Tracking Protocols: Improving Communication between Databases Amol Deshpande Database Group Department of Computer Science University of Maryland Overview Food tracking and traceability

More information

Securing INSPIREd geodata cloud services with CLARUS. INSPIRE conference 2016 (Barcelona)

Securing INSPIREd geodata cloud services with CLARUS. INSPIRE conference 2016 (Barcelona) Securing INSPIREd geo cloud services with CLARUS INSPIRE conference 2016 (Barcelona) Increase flexibility on demand elasticity ubiquitous access Reduce costs shared resources pay as you use metering Reduce

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

SRM UNIVERSITY RAMAPURAMCAMPUS PUBLICATIONS IN INDEXED JOURNALS ACADEMIC YEAR

SRM UNIVERSITY RAMAPURAMCAMPUS PUBLICATIONS IN INDEXED JOURNALS ACADEMIC YEAR SRM UNIVERSITY RAMAPURAMCAMPUS PUBLICATIONS IN INDEXED JOURNALS ACADEMIC YEAR 2016-2017 S.No Title of Paper First Author Other Authors Name of Journal 1 An Energy Aware Invasive Weed Optimization Based

More information

A Review on Privacy Preserving Data Mining Approaches

A Review on Privacy Preserving Data Mining Approaches A Review on Privacy Preserving Data Mining Approaches Anu Thomas Asst.Prof. Computer Science & Engineering Department DJMIT,Mogar,Anand Gujarat Technological University Anu.thomas@djmit.ac.in Jimesh Rana

More information

A Distributed World - the New IT Requirements of Edge Computing

A Distributed World - the New IT Requirements of Edge Computing A Distributed World - the New IT Requirements of Edge Computing JEDEC Mobile & IOT Forum Jonathan Hinkle, Sr. Research Staff Member - Systems and Memory Architecture Lenovo Research 2018 Data growth continuing

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

Nearest Neighbor Query in Location- Aware Mobile Ad-Hoc Network

Nearest Neighbor Query in Location- Aware Mobile Ad-Hoc Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

C. The system is equally reliable for classifying any one of the eight logo types 78% of the time.

C. The system is equally reliable for classifying any one of the eight logo types 78% of the time. Volume: 63 Questions Question No: 1 A system with a set of classifiers is trained to recognize eight different company logos from images. It is 78% accurate. Without further information, which statement

More information

A New Analytical Approach to Evaluate the Critical-Event Probability Due to Wireless Communication Errors in Train Control Systems

A New Analytical Approach to Evaluate the Critical-Event Probability Due to Wireless Communication Errors in Train Control Systems 2017-2018 MATLAB COMMUNICATION S IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2017 MATLAB COMMUNICATION Project Titles Domain Lang/Year 1 JPCS1701 A New Analytical Approach to Evaluate

More information

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

Securing WMSN using SHAREMIND

Securing WMSN using SHAREMIND Securing WMSN using SHAREMIND Prof. Dhanshri Patil 1, Priyanka Kanse 2, Priyanka Kakade 3, Ketaki Sortur 4, Akshata Nalawade 5 1, 2,3,4,5 UG Student Department of Computer Engineering, PCET s Nutan Maharashtra

More information

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address

More information

Review on address assignment mechanism in ZigBee wireless sensor networks

Review on address assignment mechanism in ZigBee wireless sensor networks Review on address assignment mechanism in ZigBee wireless sensor networks Nikunj saholia Pg student, Computer Engineering department Marwadi education foundation s group of institutions Shraddha joshi

More information

Based on Big Data: Hype or Hallelujah? by Elena Baralis

Based on Big Data: Hype or Hallelujah? by Elena Baralis Based on Big Data: Hype or Hallelujah? by Elena Baralis http://dbdmg.polito.it/wordpress/wp-content/uploads/2010/12/bigdata_2015_2x.pdf 1 3 February 2010 Google detected flu outbreak two weeks ahead of

More information

INTRODUCTION TO DATA MINING

INTRODUCTION TO DATA MINING INTRODUCTION TO DATA MINING 1 Chiara Renso KDDLab - ISTI CNR, Italy http://www-kdd.isti.cnr.it email: chiara.renso@isti.cnr.it Knowledge Discovery and Data Mining Laboratory, ISTI National Research Council,

More information

AT&T ESInet Customer Presentation

AT&T ESInet Customer Presentation AT&T ESInet Customer Presentation TM The best of today built for tomorrow. Table of Contents Introduction AT&T Emergency Services IP Network (AT&T ESInet TM ) Overview National Emergency Number Association

More information

Location-based Data Overlay for Intermittently-Connected Networks. Nathanael Thompson, RiccardoCrepaldi, Robin Kravets

Location-based Data Overlay for Intermittently-Connected Networks. Nathanael Thompson, RiccardoCrepaldi, Robin Kravets Location-based Data Overlay for Intermittently-Connected Networks Nathanael Thompson, RiccardoCrepaldi, Robin Kravets The Urban Experience Cracking civil infrastructures I-35 W Mississippi River bridge

More information

EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM

EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM D.Yamini 1, J. Jayavel 2 1 III-M.tech(IT), Department of Information technology,

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology ACIT'2015 Conference Program Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology Day 1 (Tuesday 15 December 2015) Registration Opening session

More information

Information Technology Enhancing Productivity and Securing Against Cyber Attacks

Information Technology Enhancing Productivity and Securing Against Cyber Attacks Information Technology Enhancing Productivity and Securing Against Cyber Attacks AGENDA Brief Overview of PortMiami Enhancing Productivity Using Technology Technology Being Using at the Port Cyber Attacks

More information