KNN Query Processing Methods in Mobile Ad Hoc Networks Abstract?KNN Query Processing Methods in Mobile Ad Hoc Networks. In mobile ad hoc networks (MANETs), location based service (LBS) is a typical application. In a LBS, it is effective for each node to acquire data using a k Nearest Neighbor (kNN) query, which retrieves the information…
Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks Abstract? We propose lightweight protocol for securing communication and preserving users’ anonymity and location privacy in hybrid ad hoc networks. Symmetric-key-cryptography operations and payment system are used to secure route discovery and data transmission. < Final Year Projects > To reduce the overhead,…
Low Overhead Control Channels in Wireless Networks Abstract? Low Overhead Control Channels in Wireless Networks. Low-latency, low-overhead and reliable control channels are essential to the efficient operation of wireless networks. However, control channels that utilize current in-band and out-of-band designs do not fully meet this requirement. In this paper, we design and implement Aileron, a…
Maximizing Data Collection Throughput on a Path in Energy Harvesting Sensor Networks Using a Mobile Sink Abstract?In energy harvesting wireless sensor networks (EH-WSNs), maximizing the data collection throughput is one of the most challenging issues. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow…
Medium Access Control for Wireless Body Area Networks with QoS Provisioning and Energy Efficient Design Abstract? With the promising applications in e-Health and entertainment services, wireless body area network (WBAN) has attracted significant interest. One critical challenge for WBAN is to track and maintain the quality of service (QoS), e.g., delivery probability and latency, under…
Minimizing Radio Resource Usage for Machine-to-Machine Communications through Data-Centric Clustering Abstract? While clustered communication has been considered as one key technology for wireless sensor networks, existing work on cluster formation predominantly takes a pure graph-theoretic approach with the goal of optimizing the performance of individual machines. Since the radio resource available for M2M communications is…
Minimizing Radio Resource Usage for Machine-to-Machine Communications through Data-Centric Clustering Abstract?Abstract While clustered communication has been considered as one key technology for wireless sensor networks, existing work on cluster formation predominantly takes a pure graph-theoretic approach with the goal of optimizing the performance of individual machines. Since the radio resource available for M2M communications is…
Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers Abstract? Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers. There is a rich recent literature on information-theoretically secure communication at the physical layer of wireless networks, where secret communication between a single transmitter and receiver has been studied extensively. In this paper, we…
Mobiflage: Deniable Storage Encryptionfor Mobile Devices Energy-Mobiflage: Deniable Storage Encryptionfor Mobile Devices. Data confidentiality can be effectively preserved through encryption. In certain situations, this is inadequate, as users may be coerced into disclosing their decryption keys. Steganographic techniques and deniable encryption algorithms have been devised to hide the very existence of encrypted data. We examine…
Mobile Crowd Computing with Work Stealing Abstract? Mobile Crowd Computing with Work Stealing. By pooling together the processing power of mobile devices within a crowd to form a ?mobile cloud?, these devices be efficiently utilized to help realize the full potential of mobile computing. However, the dynamic nature of mobile computing makes sharing and coordinating…
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks Abstract?Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks. A three-layer framework is proposed for mobile data collection in wireless sensor networks, which includes the sensor layer, cluster head layer, and mobile collector (called…
Mobile-Projected Trajectory Algorithm With Velocity-Change Detection for Predicting Residual Link Lifetime in MANET Abstract? Mobile-Projected Trajectory Algorithm With Velocity-Change Detection for Predicting Residual Link Lifetime in MANET. the estimation of residual link lifetime (RLL) in mobile ad hoc networks MANETs < Final Year Projects 2016 > using the distances between the link?s nodes. We first…