Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

I want you to Read intensively at least 10 papers and give me a summary for ever

ID: 666831 • Letter: I

Question

I want you to Read intensively at least 10 papers and give me a summary for every paper and the linghth for each paper is 2 pages or more. In the summary, you need to provide some of your own ideas.

Research Interests: Privacy-Aware Computing,Wireless and Mobile Security,Fog Computing,Mobile Health and Safety, Cognitive Radio Networking,Algorithm Design and Analysis.


You should select papers from the following conferences:

IEEE INFOCOM, IEEE Symposium on security and privacy, ACM CCS, USENIX Security.

Explanation / Answer

There is insufficient time to read all ten papers . I have read 5 papers and writing summary of these 5.

1. Towards Design of Privacy Aware Computing- A case study in Hospital work.

This paper aims at designing a primary aware computing system for hospitals that can balance the level of privacy a user is willing to hide and value of services that can be provided by the software. Analysis is performed by studying day to day activities of 2 nurses, two doctors and 2 workers to access the need of privacy control technique. Paper groups the main privacy issues faced by hospital in three main areas: 1. Sharing- Physicians can share their discussions of clinical cases in PDAs.2. Sensing- Software can sense the workers any time anywhere. 3. Storing- Information about treatment can be stored.

2. Wireless Security for mobile computing: Wireless signal can leak through walls or by passing through public areas so need is of security. Weak WIFI security can expose sensitive data. It can expose network, and can expose sensitive data. Original Wifi network is insufficient in security due to No access control, vulnerable and weak WEP, static keys. Paper explains 802.11i task group made by IEEE which defines stronges WLAN security through WPA. WPA ensures minimum chances of a key to be reused, each data packet has different key, message is not altered in transit between sender and receiver.

3. Fog Computing providing data security- A review

Cloud Computing is made secure and given name fog computing. It monitors the behaviour of user and provides security to data from intruders and helps in confusing the attacker about real information. It optimizes the website performance and leads to improved defensive technique to store data in cloud.

4. Green Paper on mobile health (mHealth): Europian Commission

Mobile health provides medical and public health with help of mobile devices like phones, PDAs, Patient monitoring devices etc. They measure heart rate, blood glucose level, BP, temperature, brain activities etc. It also includes apps providing health information, and medication reminders.

5. Cognitive radio networking and Communication- by Ayubu

Radio spectrum is most important in wireless communication. Cognitive Radio Network is an intelligent wireless communication system aware of its surrounding environment. Accordingly it adjusts frequency, modulation, transmission strenth, etc and establishes communication between CR users. CR uses various spectrum sensing methods for sensing atmosphere. Technique can be energy detector based, wavr form based, cyclostationarity based, or matched filtering technique.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote