Showing 193–204 of 207 results

  • STAMP : Enabling Privacy-Preserving Location Proofs for Mobile Users

    STAMP : Enabling Privacy-Preserving Location Proofs for Mobile Users

    0 out of 5
    5,500

    STAMP : Enabling Privacy-Preserving Location Proofs for Mobile Users Abstract?Location-based services are quickly becoming immensely popular. In addition to services based on users’ current location,many potential services rely on users’ location history,or their spatial-temporal provenance . < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides…

  • STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

    STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

    0 out of 5
    5,500

    STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users Abstract? Location-based services are quickly becoming immensely popular. In addition to services based on users? current location, many potential services rely on users? location history, or their spatial-temporal provenance. Malicious users may lie about their spatial-temporal provenance without a carefully designed security system for users to prove…

  • Supervisory Host Model: A New Paradigm to Enhance the Security  and Power Management for Mobile Grid Environment

    Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment

    0 out of 5
    3,500

    Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment Abstract? Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment. Digital certificates and signatures provide protection in legally binding situations. Even though the digital certificates are used in banking and…

  • Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks

    Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks

    0 out of 5
    4,500

    Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks Abstract?Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. This work studies the problem of tracking signal-emitting mobile targets using navigated mobile sensors based on signal reception. Since the mobile target’s maneuver is unknown, the mobile sensor controller utilizes the measurement collected by a…

  • The Capacity of Wireless CSMA/CA Networks

    The Capacity of Wireless CSMA/CA Networks

    0 out of 5
    4,500

    The Capacity of Wireless CSMA/CA Networks Abstract? The Capacity of Wireless CSMA/CA Networks. a poor understanding of the interactions among transmitters < Final Year Projects 2016 > wireless networks using carrier sense multiple access with collision avoidance (CSMA/CA) have been commonly stigmatized as unpredictable in nature. Even elementary questions regarding the throughput limitations of these…

  • Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver

    Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver

    0 out of 5
    4,500

    Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver Abstract? Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver. The increasing number of mobile devices and the demand for large throughput requiring applications has hampered access to the limited frequency spectrum. The goal of this…

  • Trust and Compactness in Social Network Groups

    Trust and Compactness in Social Network Groups

    0 out of 5
    4,500

    Trust and Compactness in Social Network Groups Abstract? Trust and Compactness in Social Network Groups. Understanding the dynamics behind group formation and evolution in social networks is considered an instrumental milestone to better describe how individuals gather and form communities, how they enjoy and share the platform contents, how they are driven by their preferences/tastes,…

  • Unsupervised traffic classification using flow statistical properties and IP packet payload

    Unsupervised traffic classification using flow statistical properties and IP packet payload

    0 out of 5
    4,500

    Unsupervised traffic classification using flow statistical properties and IP packet payload. The researchers have started looking for Internet traffic recognition techniques that are independent of `well known’ TCP or UDP port numbers or interpreting the contents of packet payloads. Newer approaches classify traffic by recognizing statistical patterns in externally observable attributes of the traffic (such…

  • Using Sentimental Analysis in Prediction of Stock Market Investment

    Using Sentimental Analysis in Prediction of Stock Market Investment

    0 out of 5
    5,500

    Using Sentimental Analysis in Prediction of Stock Market Investment Abstract?AbstractSentimental Analysis is one of the most popular technique which is widely been used in every industry. Extraction of sentiments from user?s comments is used in detecting the user view for a particular company. Sentimental Analysis can help in predicting the mood of people which affects…

  • Vampire attacks: Draining life from wireless ad-hoc sensor networks

    Vampire attacks: Draining life from wireless ad-hoc sensor networks

    0 out of 5
    4,500

    Vampire attacks: Draining life from wireless ad-hoc sensor networks Images Abstract? Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. < Final Year Project > Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores…

  • VANET-Based Secure and Privacy-Preserving Navigation

    VANET-Based Secure and Privacy-Preserving Navigation

    0 out of 5
    4,500

    VANET-Based Secure and Privacy-Preserving Navigation   Abstract? VANET-Based Secure and Privacy-Preserving Navigation. In this paper, we propose a navigation scheme that utilizes the online road information collected by a vehicular ad hoc network (VANET) to guide the drivers to desired destinations in a real-time and distributed manner. The proposed scheme has the advantage of using…

  • Vehicular Cloud Data Collection for Intelligent Transportation Systems

    Vehicular Cloud Data Collection for Intelligent Transportation Systems

    0 out of 5
    4,500

    Vehicular Cloud Data Collection for Intelligent Transportation Systems Abstract-The Internet of Things (IoT) envisions to connect billions of sensors to the Internet, in order to provide new applications and services for smart cities. IoT will allow the evolution of the Internet of Vehicles (IoV) from existing Vehicular Ad hoc Networks (VANETs), in which the delivery…

End of content

End of content