Results (3)
Search Parameters:
Keyword: PrivacyPrivacy Preserving Text Document Summarization
by A N Ramya Shree and Kiran P
Journal of Engineering Research and Sciences, Volume 1, Issue 7, Page # 7-14, 2022; DOI: 10.55708/js0107002
Abstract: Data Anonymization provides privacy preservation of the data such that input data containing sensitive information is converted into anonymized data. Hence, nobody can identify the information either directly or indirectly. During the analysis of each text document, the unique attributes reveal the identity of an entity and its private data. The proposed system preserves the… Read More
(This article belongs to the Section Biomedical Engineering (BIE))
CAPEF: Context-Aware Policy Enforcement Framework for Android Applications
by Saad Inshi, Mahdi Elarbi, Rasel Chowdhury, Hakima Ould-Slimane and Chamseddine Talhi
Journal of Engineering Research and Sciences, Volume 2, Issue 1, Page # 13-23, 2023; DOI: 10.55708/js0201002
Abstract: The notion of Context-Awareness of mobile applications is drawing more attention, where many applications need to adapt to physical environments of users and devices, such as location, time, connectivity, resources, etc. While these adaptive features can facilitate better communication and help users to access their information anywhere at any time, this however bring risks caused… Read More
(This article belongs to the Special Issue on SP2 (Special Issue on Computing, Engineering and Sciences 2022-23) and the Section Electrical Engineering (ELE))
A State-of-the-Art Survey of Peer-to-Peer Networks: Research Directions, Applications and Challenges
by Frederick Ojiemhende Ehiagwina, Nurudeen Ajibola Iromini, Ikeola Suhurat Olatinwo, Kabirat Raheem and Khadijat Mustapha
Journal of Engineering Research and Sciences, Volume 1, Issue 1, Page # 19-38, 2022; DOI: 10.55708/js0101003
Abstract: Centralized file-sharing networks have low reliability, scalability issues, and possess a single point of failure, thus making peer-to-peer (P2P) networks an attractive alternative since they are mostly anonymous, autonomous, cooperative, and decentralized. Although, there are review articles on P2P overlay networks and technologies, however, other aspects such as hybrid P2P networks, modelling of P2P, trust… Read More
(This article belongs to the Section Multidisciplinary – Sciences (MLS))