Exploring New Opportunities to Defeat Low-rate DDoS Attack in Container-based Cloud Environment Abstract-DDoS attacks are rampant in cloud environments and continually evolve into more sophisticated and intelligent modalities, such as low-rate DDoS attacks. But meanwhile, the cloud environment is also developing in constant. Now container technology and microservice architecture are widely applied in cloud environment…
Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach Abstract? In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malevolent nodes, this requirement may lead to serious security concerns; for instance,…
Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols Abstract? Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols. A comprehensive delay and queueing analysis for two baseline medium access control protocols for multi-user cognitive radio networks with homogeneous users and channels and investigate the impact of different network parameters on the system performance. <...
Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols Abstract?We provide a comprehensive delay and queueing analysis for two baseline medium access control protocols for multi-user cognitive radio networks with homogeneous users and channels and investigate the impact of different network < Final Year Projects 2016 > on the system performance. In addition to an…
Delay-Constrained Caching in Cognitive Radio Networks Abstract? In cognitive radio networks, unlicensed users can use under-utilized licensed spectrum to achieve substantial performance improvement. To avoid interference with licensed users, unlicensed users must vacate the spectrum when it is accessed by licensed (primary) users. Since it takes some time for unlicensed users to switch to other…
Delay-Optimized File Retrieval under LT-Based Cloud Storage Abstract-Fountain-code based cloud storage system provides reliable online storage solution through placing unlabeled content blocks into multiple storage nodes. Luby Transform (LT) code is one of the popular fountain codes for storage systems due to its efficient recovery. However, to ensure high success decoding of fountain codes based…
Demystifying the Imperfect Client-Side Cache Performance of Mobile Web Browsing Abstract? The web browser is one of the most significant applications on mobile devices such as smartphones. However, the user experience of mobile web browsing is undesirable because of the slow resource loading. To improve the performance of web resource loading, client-side cache has been…
Dental radiographs and photographs in human forensic identification Abstract– Dental radiographs and photographs in human forensic identification. Dentistry can contribute for the identification of human remains after any disasters or crimes in assistance to other medical specialties. The algorithm can be developed by comparing post mortem and ante mortem dental radiographs. This work aims…
Deployment of IoT based smart security and monitoring device for Agriculture Abstract-In the real world, many farmers face problem in monitoring their farms. The farmers have more difficulties to monitor all the farms at the same time. Hence the project is developed to monitor the farms in the field with temperature level, Soil Moisture, Water…
Design and Implementations of Bharathi kannamma Charity Trust Abstract?AbstractA charitable trust is an irrevocable trust established for charitable purposes and, in some jurisdictions, a more specific term than “charitable organization”. A charitable trust enjoys a varying degree of tax benefits in most countries. It also generates good will. Some important terminology in charitable trusts is…
Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks Abstract? Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to blackhole and greyhole attacks in which malicious nodes intentionally drop all or part of the received messages. Although…
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach Abstract?Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach. Detecting node failures in mobile wireless networks is very challenging because the network topology can be highly dynamic, the network may not be always connected, and there sources are limited. In this paper, we take…