Showing 277–288 of 860 results

  • Defeat Low-rate DDoS Attack in Container-based Cloud Environment

    Defeat Low-rate DDoS Attack in Container-based Cloud Environment

    0 out of 5
    4,500

    Exploring New Opportunities to Defeat Low-rate DDoS Attack in Container-based Cloud Environment Abstract-DDoS attacks are rampant in cloud environments and continually evolve into more sophisticated and intelligent modalities, such as low-rate DDoS attacks. But meanwhile, the cloud environment is also developing in constant. Now container technology and microservice architecture are widely applied in cloud environment…

  • Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach

    Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach

    0 out of 5
    4,500

    Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach Abstract? In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malevolent nodes, this requirement may lead to serious security concerns; for instance,…

  • Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols

    Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols

    0 out of 5
    4,500

    Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols Abstract? Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols. A comprehensive delay and queueing analysis for two baseline medium access control protocols for multi-user cognitive radio networks with homogeneous users and channels and investigate the impact of different network parameters on the system performance. <...

  • Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols

    Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols

    0 out of 5
    4,500

    Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols Abstract?We provide a comprehensive delay and queueing analysis for two baseline medium access control protocols for multi-user cognitive radio networks with homogeneous users and channels and investigate the impact of different network < Final Year Projects 2016 > on the system performance. In addition to an…

  • Delay-Constrained Caching in Cognitive Radio Networks

    Delay-Constrained Caching in Cognitive Radio Networks

    0 out of 5
    5,500

    Delay-Constrained Caching in Cognitive Radio Networks Abstract? In cognitive radio networks, unlicensed users can use under-utilized licensed spectrum to achieve substantial performance improvement. To avoid interference with licensed users, unlicensed users must vacate the spectrum when it is accessed by licensed (primary) users. Since it takes some time for unlicensed users to switch to other…

  • Delay-Optimized File Retrieval under LT-Based Cloud Storage

    Delay-Optimized File Retrieval under LT-Based Cloud Storage

    0 out of 5
    4,500

    Delay-Optimized File Retrieval under LT-Based Cloud Storage Abstract-Fountain-code based cloud storage system provides reliable online storage solution through placing unlabeled content blocks into multiple storage nodes. Luby Transform (LT) code is one of the popular fountain codes for storage systems due to its efficient recovery. However, to ensure high success decoding of fountain codes based…

  • Demystifying the Imperfect Client-Side Cache Performance of Mobile Web Browsing

    Demystifying the Imperfect Client-Side Cache Performance of Mobile Web Browsing

    0 out of 5
    5,500

    Demystifying the Imperfect Client-Side Cache Performance of Mobile Web Browsing Abstract? The web browser is one of the most significant applications on mobile devices such as smartphones. However, the user experience of mobile web browsing is undesirable because of the slow resource loading. To improve the performance of web resource loading, client-side cache has been…

  • Dental radiographs and photographs in human forensic identification

    Dental radiographs and photographs in human forensic identification

    0 out of 5
    4,500

    Dental radiographs and photographs in human forensic identification   Abstract– Dental radiographs and photographs in human forensic identification. Dentistry can contribute for the identification of human remains after any disasters or crimes in assistance to other medical specialties. The algorithm can be developed by comparing post mortem and ante mortem dental radiographs. This work aims…

  • Deployment of IoT based smart security and monitoring device for Agriculture

    Deployment of IoT based smart security and monitoring device for Agriculture

    0 out of 5
    5,500

    Deployment of IoT based smart security and monitoring device for Agriculture Abstract-In the real world, many farmers face problem in monitoring their farms. The farmers have more difficulties to monitor all the farms at the same time. Hence the project is developed to monitor the farms in the field with temperature level, Soil Moisture, Water…

  • Design and Implementations of Bharathi kannamma Charity Trust

    Design and Implementations of Bharathi kannamma Charity Trust

    0 out of 5
    5,500

    Design and Implementations of Bharathi kannamma Charity Trust Abstract?AbstractA charitable trust is an irrevocable trust established for charitable purposes and, in some jurisdictions, a more specific term than “charitable organization”. A charitable trust enjoys a varying degree of tax benefits in most countries. It also generates good will. Some important terminology in charitable trusts is…

  • Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks

    Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks

    0 out of 5
    5,500

    Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks Abstract? Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to blackhole and greyhole attacks in which malicious nodes intentionally drop all or part of the received messages. Although…

  • Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach

    Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach

    0 out of 5
    4,500

    Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach Abstract?Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach. Detecting node failures in mobile wireless networks is very challenging because the network topology can be highly dynamic, the network may not be always connected, and there sources are limited. In this paper, we take…

End of content

End of content