Showing 109–120 of 148 results

  • Performance-Aware Cloud Resource Allocation via Fitness-enabled Auction

    Performance-Aware Cloud Resource Allocation via Fitness-enabled Auction

    0 out of 5
    4,500

    Performance-Aware Cloud Resource Allocation via Fitness-enabled Auction Abstract?Performance-Aware Cloud Resource Allocation via Fitness-enabled Auction. A new computing paradigm which features renting the computation devices instead of buying them.In a typical cloud computing environment,there will always be different kinds of cloud resources and a number of cloud services making use of cloud resources to run on….

  • PIS: A Multi-dimensional Routing Protocol for Socially-aware Networking

    PIS: A Multi-dimensional Routing Protocol for Socially-aware Networking

    0 out of 5
    5,500

    PIS: A Multi-dimensional Routing Protocol for Socially-aware Networking Abstract?AbstractSocially-aware networking is an emerging paradigm for intermittently connected networks consisting of mobile users with social relationships and characteristics. In this setting, humans are the main carriers of mobile devices. Hence, their connections,social features, and behaviors can be exploited to improve the performance of data forwarding protocols….

  • Primary User-aware Optimal Discovery Routing for Cognitive Radio Networks

    Primary User-aware Optimal Discovery Routing for Cognitive Radio Networks

    0 out of 5
    4,500

    Primary User-aware Optimal Discovery Routing for Cognitive Radio Networks Abstract-Routing protocols in multi-hop cognitive radio networks (CRNs) can be classified into two main categories: local and global routing. Local routing protocols aim at decreasing the overhead of the routing process while exploring the route by choosing, in a greedy manner, one of the direct neighbors….

  • Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing

    Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing

    0 out of 5
    4,500

    Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing Abstract-Privacy has become a considerable issue when the applications of big data are dramatically growing in cloud computing. The benefits of the implementation for these emerging technologies have improved or changed service models and improve application performances in various perspectives. However, the remarkably growing…

  • PSaD: A Privacy-preserving Social-assisted Content Dissemination Scheme in DTNs

    PSaD: A Privacy-preserving Social-assisted Content Dissemination Scheme in DTNs

    0 out of 5
    4,500

    PSaD: A Privacy-preserving Social-assisted Content Dissemination Scheme in DTNs   Abstract?PSaD: A Privacy-preserving Social-assisted Content Dissemination Scheme in DTNs. Content dissemination is very useful for many mobile applications, like instant messaging, file sharing, and advertisement broadcast, etc. In real life, for various kinds of time-insensitive contents, such as family photos and video clips, the process…

  • Pupil Dynamics for Iris Liveness Detection

    Pupil Dynamics for Iris Liveness Detection

    0 out of 5
    3,500

    Pupil Dynamics for Iris Liveness Detection Abstract? Pupil Dynamics for Iris Liveness Detection. The primary objective of this paper is to propose a complete methodology for eye liveness detection based on pupil dynamics. This method may serve as a component of presentation attack detection in iris recognition systems, making them more secure. Due to a…

  • Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks

    Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks

    0 out of 5
    4,500

    Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks Abstract– In the first place, addresses the problem of Access Point (AP) selection in large Wi-Fi networks. Unlike current solutions that rely on Received Signal Strength (RSS) to determine the best AP that could serve a wireless user?s request, we propose a novel…

  • Receiver-Based Channel Allocation in Cognitive Radio Wireless Mesh Networks

    Receiver-Based Channel Allocation in Cognitive Radio Wireless Mesh Networks

    0 out of 5
    4,500

    Receiver-Based Channel Allocation in Cognitive Radio Wireless Mesh Networks Abstract? Receiver-Based Channel Allocation in Cognitive Radio Wireless Mesh Networks. We study the channel allocation problem in cognitive radio wireless mesh networks < Final Year Projects 2016 > CR-WMNs. We aim at finding an allocation strategy that guarantees quality of service(QoS)(linkreliability),maximizes network coverage,and alleviates the need…

  • Reducing Interferences in VANETs

    Reducing Interferences in VANETs

    0 out of 5
    4,500

    Reducing Interferences in VANETs Abstract? Reducing Interferences in VANETs. Mobile ad hoc networks (MANETs) are networks that are created on the fly < Final Year Projects 2016 > between various mobile nodes and do not require infrastructure. The mobile nodes can move around, and the network would automatically reconfigure itself to allow connectivity. Vehicular ad…

  • Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks

    Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks

    0 out of 5
    4,500

    Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks Abstract? Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks. To ensure the security and privacy of the patient?s health status in the wireless body area networks < Final Year Projects 2016 > WBANs., it is…

  • Robust Estimators for Variance-Based Device-Free Localization and Tracking

    Robust Estimators for Variance-Based Device-Free Localization and Tracking

    0 out of 5
    4,500

    Robust Estimators for Variance-Based Device-Free Localization and Tracking Abstract? Robust Estimators for Variance-Based Device-Free Localization and Tracking. Human motion in the vicinity of a wireless link causes variations in the link received signal strength(RSS). Device-free localization (DFL) systems, such as variance-based radio tomographic imaging < Final Year Projects 2016 > VRTI, use these RSS variations…

  • Routing in Socially Selfish Delay Tolerant Networks

    Routing in Socially Selfish Delay Tolerant Networks

    0 out of 5
    4,500

    Routing in Socially Selfish Delay Tolerant Networks Abstract-Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are socially selfish; i.e., they are willing to forward packets for nodes with whom they have social ties but not others, and such…

End of content

End of content