• Online Blood Banking System

    Online Blood Banking System

    4,500.00

    Online Blood, Banking System Abstract? Online Blood Banking System is specially meant for hospital who need blood for their patient regularly or for blood bank who collect blood to be given for different hospital. Here we maintain the information about the donor. ONLINE BLOOD BANKING SYSTEM helps the doctors and patients to find the donor…

  • Opportunistic Routing in Presence of Selfish Nodes for MANET

    Original price was: ₹4,500.00.Current price is: ₹4,200.00.

    [vc_row][vc_column][vc_column_text] Abstract: Opportunistic Routing in Presence of Selfish Nodes for MANET.Opportunistic Routing protocols use broadcast nature of wireless communication to improve packet delivery from source to destination in mobile ad hoc network (MANET). In traditional routing protocols for MANET, each node uses the best neighbor for forwarding packet to destination. In opportunistic routing, a node…

  • NS2

    Optimal and Maximized Configurable Power Saving Protocols for Corona-Based Wireless Sensor Networks

    4,500.00

    Optimal and Maximized Configurable Power Saving Protocols for Corona-Based Wireless Sensor Networks Abstract? Optimal and Maximized Configurable Power Saving Protocols for Corona-Based Wireless Sensor Networks.Wireless sensor networks (WSNs) are one of the most important ingredients in the Internet of Things. Thus it is vital to design a good power saving protocol, which operates at the…

  • Optimal Channel Switching Over Gaussian Channels Under Average Power and Cost Constraints

    Optimal Channel Switching Over Gaussian Channels Under Average Power and Cost Constraints

    4,500.00

    Optimal Channel Switching Over Gaussian Channels Under Average Power and Cost Constraints Abstract? Optimal Channel Switching Over Gaussian Channels Under Average Power and Cost Constraints. Optimal channel switching that provides the highest performance over a set of Gaussian channels with variable utilization costs is investigated in the presence of average power and average cost constraints….

  • Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices

    Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices

    4,500.00

    Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Abstract? Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices. As malware attacks become more frequently in mobile networks, deploying an efficient defense system to protect against infection and to help the infected nodes to recover is important to prevent serious spreading and outbreaks….

  • Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks

    Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks

    4,500.00

    Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks Abstract? Particle swarm optimization (PSO)-based effective clustering in wireless sensor networks is proposed. In the existing optimized energy ef?cient routing protocol (OEERP), during cluster formation some of the nodes are left out without being a member of any of the cluster which results…

  • NS2-WirelessWireless Sensor Networks projects

    Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks

    4,500.00

    Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks Abstract? Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks. Particle swarm optimization (PSO)-based effective clustering in wireless sensor networks is proposed. In the existing optimized energy ef?cient routing protocol (OEERP), during cluster formation some of the nodes are left…

  • Path-Permutation Codes for End-to-End Transmission in Ad Hoc Cognitive Radio Networks

    Path-Permutation Codes for End-to-End Transmission in Ad Hoc Cognitive Radio Networks

    4,500.00

    Path-Permutation Codes for End-to-End Transmission in Ad Hoc Cognitive Radio Networks Abstract?Cognitive radios < Final Year Projects 2016 > CRs improve the spectrum ef?ciency in wireless communications. Nonetheless, owing to the intrinsic randomness of ad hoc cognitive radio networks (CRNs), e.g., the opportunistic links, the traditional realization of ad hoc networking that demands the end-to-end…

  • Performance Analysis of OMP based Channel Estimations in Mobile OFDM Systems

    Performance Analysis of OMP based Channel Estimations in Mobile OFDM Systems

    4,500.00

    Performance Analysis of OMP based Channel Estimations in Mobile OFDM Systems Abstract-To analyze the performance of orthogonal matching pursuit (OMP)-based compressed channel estimation (CCE) with deterministic pilot patterns, we propose a mathematical framework by de?ning four normalized mean-square-errors (NMSEs): the total NMSE (NMSE), the NMSE on dominant channel components (NMSEDT), the NMSE caused by ?lost…

  • PlaceholderPredictive Data Delivery to Mobile Users projects

    Predictive Data Delivery to Mobile Users through Mobility Learning in Wireless Sensor Networks

    4,500.00

    Predictive Data Delivery to Mobile Users through Mobility Learning in Wireless Sensor Networks Abstract? We consider applications, such as indoor navigation, evacuation, or targeted advertising, where mobile users equipped with a smart-phone class device require access to sensor network data measured in their proximity. Speci?cally, we focus on ef?cient communication protocols between static sensors and…

  • Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks

    Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks

    4,500.00

    Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks Abstract? Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks. Special designs are needed for cryptographic schemes in wireless sensor networks < Final Year Projects 2016 > WSNs. This is because sensor nodes are limited in memory storage and computational power. In 1992, Blundo…

  • Privacy Protection for Wireless Medical Sensor Data

    Privacy Protection for Wireless Medical Sensor Data

    4,500.00

    Privacy Protection for Wireless Medical Sensor Data Abstract? wireless sensor networks have been widely used in healthcare applications, such as hospital and home patient monitoring. Wireless medical sensor networks are more vulnerable to eavesdropping, modi?cation, impersonation and replaying attacks than the wired networks. A lot of work has been done to secure wireless medical sensor…