Scale invariant and deformation tolerant partial shape matching Abstract– Scale invariant and deformation tolerant partial shape matching. We propose a novel multi-scale shape descriptor for shape matching and object recognition. The descriptor includes three types of invariants in multiple scales to capture discriminative local and semi-global shape features and the dynamic programming algorithm is…
SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc Networks Abstract?The issue of selecting routing paths with minimum end-to-end delay (E2ED) for nonsafety applications in urban vehicular adhoc networks (VANETs). Most existing schemes aim at reducing E2ED via greedy-based tech-niques < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code…
Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs Abstract? Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs. Cooperative wireless networking, which is promising in improving the system operation efficiency and reliability by acquiring more accurate and timely information, has attracted considerable attentions to support many services in practice. However, the problem…
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract? Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. At present, due to limited computational power and energy resources of sensor nodes, aggregation of data from multiple sensor nodes done at the aggregating node is…
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach Abstract? Key pre-distribution algorithms have recently emerged as efficient alter natives of key management in today?s secure communications landscape. Secure routing techniques using key pre-distribution algorithms require special algorithms capable of finding optimal secure over lay paths. To the best of our knowledge, the…
Securing Cognitive Radio Networks against Primary User Emulation Attacks Abstract? Securing Cognitive Radio Networks against Primary User Emulation Attacks. Securing Cognitive Radio Networks against Primary User Emulation Attacks. Cognitive Radio (CR) is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for…
Securing the Backpressure Algorithm for Wireless Networks Abstract-In the first place, the backpressure algorithm is known to provide throughput optimality in routing and scheduling decisions for multi-hop networks with dynamic traffic. The essential assumption in the backpressure algorithm is that all nodes are benign and obey the algorithm rules governing the information exchange and underlying…
Service Class Resource Management for Green Wireless-Optical Broadband Access Networks (WOBAN) Abstract? Service Class Resource Management for Green Wireless-Optical Broadband Access Networks. Exponential growth in the volume of wireless data, boosted by the growing popularity of mobile devices, such as smart- phone and tablets, has forced the telecommunication industries to rethink the way networks are…
SIR: a secure and intelligent routing protocol for vehicular ad hocnetwork Abstract? SIR: a secure and intelligent routing protocol for vehicular ad hocnetwork. Security in routing is an important issue in vehicular ad hoc network < Final Year Projects 2016 > to protect the valuable information. However, this intelligent transportation system (ITS) services provided by…
SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays Abstract? SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays. Current IEEE 802.11 WLANs suffer from the well-known rate anomaly problem, which can drastically reduce network performance. Opportunistic relaying can address this problem, but three major considerations, typically considered separately by prior work, need to be taken into account for…
Spectrum-Aware Anypath Routing in Multi-Hop Cognitive Radio Networks Abstract– Cognitive radio networks (CRNs) have been emerging as a promising technique to improve the spectrum efficiency of wireless and mobile networks, which form spectrum clouds to provide services for unlicensed users. As spectrum clouds, the performance of multi-hop CRNs heavily depends on the routing protocol. In…
SSD: A Robust RF Location Fingerprint Addressing Mobile Devices? Heterogeneity Abstract? SSD: A Robust RF Location Fingerprint Addressing Mobile Devices? Heterogeneity. Fingerprint-based methods are widely adopted for indoor localization purpose because of their cost-effectiveness compared to other infrastructure-based positioning systems. However, the popular location fingerprint, Received Signal Strength (RSS), is observed to differ significantly across…