Real-Time Signal Quality-Aware ECG Telemetry System for IoT-Based Health Care Monitoring Abstract-In the first place, propose a novel signal qualityaware IoT-enabled ECG telemetry system for continuous cardiac health monitoring applications. The proposed quality-aware ECG monitoring system consists of three modules: ECG signal sensing module; automated signal quality assessment module; and signal-quality aware ECG analysis and…
REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks Abstract? REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized…
Realtime Scheduling with security enhancement in packet switched networks Abstract? Real-time network applications depend on schedulers to guarantee the quality of service (QoS). Conventional real-time schedulers focus on the timing constraints but are much less effective in satisfying the security requirements. < Final Year Project > In this paper, we propose an adaptive security-aware…
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks sequence and plain text Abstract?we propose redundancy management of heterogeneous wireless sensor networks (HWSNs), utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. The key concept of our redundancy management is to exploit the tradeoff between…
Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior. A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes the temporal and spatial locality to extract the behavior features of the proxy-to-server traffic, which makes the scheme independent of the traffic intensity and…
Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory Abstract?Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory, In this paper, we propose a method of constructing a virtual coordinate system (ABVCap) in wireless sensor networks where location information is not available. A routing protocol based on ABVCap virtual…
Reversible Data Hiding in Encrypted Images by Reversible Image Transformation Abstract?Abstract With the popularity of outsourcing data to the cloud,it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the same time. Under such demands,reversible data hiding in encrypted images (RDH-EI) attracts more and more…
Review On- Netspam: A Network-Based Spam Detection Framework For Reviews In Online Social Media Abstract-Todays, a major part of everyone trusts on content in social media like opinions and feedbacks of a topic or a product. The liability that anyone can take off a survey give a brilliant chance to spammers to compose spam surveys…
RFID based tollgate collection system Abstract?RFID based tollgate collection system. A customized radio frequency identification (RFID)-based sensor system is proposed to achieve reliable data collection and transmission between downhole and ground for the intelligent oilwell. In this paper, the overall system architecture is introduced first, and then, the corresponding hardware systems are designed in detail….
RIHT:A Novel Hybrid ip tracebackscheme Abstract? Because the Internet has been widely applied in various fields, more and more network security issues emerge and catch people’s attention.< Final Year Project > However, adversaries often hide themselves by spoofing their own IP addresses and then launch attacks. For this reason, researchers have proposed a lot…