Showing 157–168 of 207 results

  • Real-Time Signal Quality-Aware ECG Telemetry System for IoT-Based Health Care Monitoring

    Real-Time Signal Quality-Aware ECG Telemetry System for IoT-Based Health Care Monitoring

    0 out of 5
    4,500

    Real-Time Signal Quality-Aware ECG Telemetry System for IoT-Based Health Care Monitoring Abstract-In the first place, propose a novel signal qualityaware IoT-enabled ECG telemetry system for continuous cardiac health monitoring applications. The proposed quality-aware ECG monitoring system consists of three modules: ECG signal sensing module; automated signal quality assessment module; and signal-quality aware ECG analysis and…

  • REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

    REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

    0 out of 5
    4,500

    REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks Abstract? REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized…

  • Realtime Scheduling with security enhancement in packet switched networks

    Realtime Scheduling with security enhancement in packet switched networks

    0 out of 5
    4,500

    Realtime Scheduling with security enhancement in packet switched networks   Abstract? Real-time network applications depend on schedulers to guarantee the quality of service (QoS). Conventional real-time schedulers focus on the timing constraints but are much less effective in satisfying the security requirements. < Final Year Project > In this paper, we propose an adaptive security-aware…

  • Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    0 out of 5
    4,500

    Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks Abstract? Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video…

  • Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    0 out of 5
    4,500

    Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks sequence and plain text Abstract?we propose redundancy management of heterogeneous wireless sensor networks (HWSNs), utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. The key concept of our redundancy management is to exploit the tradeoff between…

  • Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior

    Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior

    0 out of 5
    4,500

    Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior. A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes the temporal and spatial locality to extract the behavior features of the proxy-to-server traffic, which makes the scheme independent of the traffic intensity and…

  • Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory

    Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory

    0 out of 5
    4,500

    Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory Abstract?Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory, In this paper, we propose a method of constructing a virtual coordinate system (ABVCap) in wireless sensor networks where location information is not available. A routing protocol based on ABVCap virtual…

  • Reversible Data Hiding in Encrypted Images by Reversible Image Transformation

    Reversible Data Hiding in Encrypted Images by Reversible Image Transformation

    0 out of 5
    5,500

    Reversible Data Hiding in Encrypted Images by Reversible Image Transformation Abstract?Abstract With the popularity of outsourcing data to the cloud,it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the same time. Under such demands,reversible data hiding in encrypted images (RDH-EI) attracts more and more…

  • Review On- Netspam: A Network-Based Spam Detection Framework For Reviews In Online Social Media

    Review On- Netspam: A Network-Based Spam Detection Framework For Reviews In Online Social Media

    0 out of 5
    4,500

    Review On- Netspam: A Network-Based Spam Detection Framework For Reviews In Online Social Media Abstract-Todays, a major part of everyone trusts on content in social media like opinions and feedbacks of a topic or a product. The liability that anyone can take off a survey give a brilliant chance to spammers to compose spam surveys…

  • RFID based tollgate collection system

    RFID based tollgate collection system

    0 out of 5
    4,500

    RFID based tollgate collection system Abstract?RFID based tollgate collection system. A customized radio frequency identification (RFID)-based sensor system is proposed to achieve reliable data collection and transmission between downhole and ground for the intelligent oilwell. In this paper, the overall system architecture is introduced first, and then, the corresponding hardware systems are designed in detail….

  • Rich Receiver initial client head multicast approach for grid application

    Rich Receiver initial client head multicast approach for grid application

    0 out of 5
    4,500

    Rich Receiver initial client head multicast approach for grid application Abstract? Rich Receiver initial client head multicast approach for grid application Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • RIHT:A Novel Hybrid ip tracebackscheme

    RIHT:A Novel Hybrid ip tracebackscheme

    0 out of 5
    4,500

    RIHT:A Novel Hybrid ip tracebackscheme   Abstract? Because the Internet has been widely applied in various fields, more and more network security issues emerge and catch people’s attention.< Final Year Project > However, adversaries often hide themselves by spoofing their own IP addresses and then launch attacks. For this reason, researchers have proposed a lot…

End of content

End of content