Showing 37–48 of 148 results

  • Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols

    0 out of 5
    4,500

    Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols Abstract?We provide a comprehensive delay and queueing analysis for two baseline medium access control protocols for multi-user cognitive radio networks with homogeneous users and channels and investigate the impact of different network < Final Year Projects 2016 > on the system performance. In addition to an…

  • Delay-Constrained Caching in Cognitive Radio Networks

    0 out of 5
    5,500

    Delay-Constrained Caching in Cognitive Radio Networks Abstract? In cognitive radio networks, unlicensed users can use under-utilized licensed spectrum to achieve substantial performance improvement. To avoid interference with licensed users, unlicensed users must vacate the spectrum when it is accessed by licensed (primary) users. Since it takes some time for unlicensed users to switch to other…

  • Demystifying the Imperfect Client-Side Cache Performance of Mobile Web Browsing

    0 out of 5
    5,500

    Demystifying the Imperfect Client-Side Cache Performance of Mobile Web Browsing Abstract? The web browser is one of the most significant applications on mobile devices such as smartphones. However, the user experience of mobile web browsing is undesirable because of the slow resource loading. To improve the performance of web resource loading, client-side cache has been…

  • Dental radiographs and photographs in human forensic identification

    0 out of 5
    4,500

    Dental radiographs and photographs in human forensic identification   Abstract– Dental radiographs and photographs in human forensic identification. Dentistry can contribute for the identification of human remains after any disasters or crimes in assistance to other medical specialties. The algorithm can be developed by comparing post mortem and ante mortem dental radiographs. This work aims…

  • Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks

    0 out of 5
    5,500

    Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks Abstract? Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to blackhole and greyhole attacks in which malicious nodes intentionally drop all or part of the received messages. Although…

  • Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach

    0 out of 5
    4,500

    Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach Abstract?Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach. Detecting node failures in mobile wireless networks is very challenging because the network topology can be highly dynamic, the network may not be always connected, and there sources are limited. In this paper, we take…

  • Detection and Prevention of Wormhole Attack Manet

    0 out of 5
    3,500

    Detection and Prevention of Wormhole Attack Manet Abstract? The development in wireless technologies and the high availability of wireless equipment in everyday life have made infrastructure-less networks very popular. MANETs are becoming more and more common due to their ease of deployment. Unlike the wireless networks having a fixed infrastructure, a mobile ad hoc network…

  • Device-to-Device Communications for Enhancing Quality of Experience in Software Defined Multi-Tier LTE-A Networks

    0 out of 5
    4,500

    Device-to-Device Communications for Enhancing Quality of Experience in Software Defined Multi-Tier LTE-A Networks Abstract?3GPP has been developing LTE-A standard to significantly enhance the performance of cellular networks by utilizing various radio access techniques to provide ubiquitous and seamless broadband access to a rich diversity of mobile connected devices, which usually demand high QoE in spite…

  • Discovering Mobile Applications in Cellular Device-to-Device Communications: Hash Function and Bloom Filter-Based Approach

    0 out of 5
    4,500

    Discovering Mobile Applications in Cellular Device-to-Device Communications: Hash Function and Bloom Filter-Based Approach Abstract? We propose a code-based discovery protocol for cellular device-to-device < Final Year Projects 2016 > D2D communications. To realize proximity based services such as mobile social networks and mobile marketing using D2D communications, each device should ?rst discover nearby devices, which…

  • DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance

    0 out of 5
    4,500

    DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance Abstract-Centralized solutions for vehicular traffic re-routing to alleviate congestion suffer from two intrinsic problems: scalability, as the central server has to perform intensive computation and communication with the vehicles in real-time; and privacy, as the drivers have to share their location as well as the…

  • Dynamic Frequency Resource Allocation in Heterogeneous Cellular Networks

    0 out of 5
    5,500

    Dynamic Frequency Resource Allocation in Heterogeneous Cellular Networks Abstract?Deployment of low power pico basestations within cellular networks can potentially increase both capacity and coverage. However, such deployments require efficient frequency allocation schemes for managing interference from the pico and macro basestations that are located within each other?s trans-mission range. < final year projects > [numbers_sections…

  • Dynamic Frequency Resource Allocation in Heterogeneous Cellular Networks

    0 out of 5
    5,500

    Dynamic Frequency Resource Allocation in Heterogeneous Cellular Networks Abstract? Deployment of low power pico basestations within cellular networks can potentially increase both capacity and coverage. However, such deployments require efficient frequency allocation schemes for managing interference from the pico and macro basestations that are located within each other?s transmission range. Partitioning the available frequencies between…

End of content

End of content