Papers in this group

1 - 20 of 57
  1. -OBD-II provides additional information to engineer for diagnosis and repair of emissions related problems. OBD-II, standardizes on the amount of memory (Freeze Frame) it uses to store the readings of the vehicle sensor when it logs on emission…
  2. Cloud computing is the extended vision of computing as a effectiveness, where data owners can remotely store their data. The essential service presents by the Cloud is Data Storage. On the other hand, it is a tricky task for sharing data in…
  3. -The coupling of two working parts, for example two shaft, in such a way as to permit connection or disconnection at will without the necessity of bringing both parts to rest, and when connected to transmit the required amount of power without sign…
  4. Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for…
  5. -In this paper we demonstrates development of the energy efficiency (EE) of multi-user multiple-input multiple-output (MIMO) orthogonal frequency-division multiple access (OFDMA) system, an Energy-efficient multiple access (EMA) scheme is proposed.…
  6. -Cloud storage services have grow popularly. For the importance reason of privacy, many cloud storage encryption schemas has been proposed to secure the data from those who do not have access. All such schemes assumes that cloud storage providers…
  7. -Disruption-tolerant network (DTN) advancements are getting to be a productive provision that allow remote device passed on by officers to talk with each other and access the classified data or secret data by abusing outside storage nodes. This…
  8. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the…
  9. -Graphs are widely employed in massive scale social network analysis. Graph mining more and more necessary in modeling difficult structures like circuits, images, web, biological networks and social networks. The key issues occur during this graph…
  10. -Delay Tolerant Networks (DTNs), also called as intermittently connected mobile networks, are wireless networks in which a fully connected path from source to destination is unlikely to exist. However, effective forwarding based on a limited…
  11. -Cloud computing allow business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from resource multiplexing through virtualization technology. In this paper, we present a system…
  12. -Recognizing or inferring client's search objective from given query is a difficult job as search engines let users to identify queries simply as a list of keywords which might refer to broad topics, to technical terminology, or even to proper nouns…
  13. -In cloud computing outsourcing, cluster plus among cloud shoppers could be a noteworthy check, therefore cloud computing provides a token effort and everyone around sorted out the arrangement. Thanks to incessant modification of participation,…
  14. -In this paper we investigate on set of activities presented via temporal stochastic automata, partitions of activities based on level based events, in this connection our investigation on issues with activity creations on temporal multi-activity…
  15. -DTMN advancements are getting to be a productive provision that allow remote device passed on by officers to talk with each other and access the classified data or secret data by abusing outside storage nodes. This framework gives the effective…
  16. -In recent times, most mobile applications are for information sharing; mobile devices are increasingly becoming the end points of information consuming and gradually fetching end points of information consuming. Motivated by the new demands of…