A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm Abstract?AbstractIn power system, minimizing the power loss in the transmission lines and/or minimizing the voltage deviation at the load buses by controlling the reactive power is referred as optimal reactive power dispatch (ORPD). This paper presents…
A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes Abstract– The development of the Internet of Things (IoT) has made extraordinary progress in recent years in both academic and industrial fields. There are quite a few smart home systems that have been developed by major companies to achieve home automation. However, the nature…
A Resource Allocation Scheme for Multiple Device-to-Device Multicasts in Cellular Networks Abstract?Device-to-Device (D2D) multicast communication is emerging as a practical solution to alleviate severe capacity crunch in data-centric wireless networks. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution…
A Review of Anomaly based Intrusion Detection Systems Abstract? With the advent of anomaly-based intrusion detection systems, many approaches and techniques have been developed to track novel attacks on the systems. High detection rate of 98% at a low alarm rate of 1% can be achieved by using these techniques. Though anomaly-based approaches are efficient,…
A SDN-based QoS Guaranteed Technique for Cloud Applications Abstract– Due to the centralized control, network-wide monitoring and flow-level scheduling of Software-Defined-Networking (SDN), it can be utilized to achieve Quality of Service (QoS) for cloud applications and services, such as voice over IP, video conference and online games, etc. However, most existing approaches stay at the…
A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks Abstract? A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks. In the harsh environment where node density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join…
Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach Abstract? The joint power and subcarrier allocation problem is solved in the context of maximizing the energy-ef?ciency (EE) of a multi-user, multi-relay orthogonal frequency division multiple access (OFDMA) cellular network, where the objective function is formulated as the ratio of the spectral-ef?ciency (SE)…
Adaptive SLA-Aware Algorithms for Provisioning Shared Mesh Optical Networks Abstract? Adaptive SLA-Aware Algorithms for Provisioning Shared Mesh Optical Networks. The paper presents a priority-aware algorithm to preserve higher priority requests over optical mesh networks. The paper discusses an algorithm to improve resource utilization and availability performance of shared mesh optical networks. The algorithm benefits from…
Advanced probabilistic approach for network intrusion forecasting and detection Abstract? Advanced probabilistic approach for network intrusion forecasting and detection. This study aims to propose a probabilistic approach for detecting network intrusions using Bayesian Networks (BNs). Three variations of BN, namely, Na?ve Bayesian Network (NBC), Learned BN, and hand-crafted BN, were evaluated and from which, an…
An Advanced Moving Object Detection Algorithm for Automatic Traffic Monitoring In Real-World Limited Bandwidth Networks Abstract? Machine- controlled motion detection technology is Associate in nursing integral element of intelligent transportation systems, and is especially essential for management of traffic and maintenance of traffic police investigation systems. Traffic police investigation systems mistreatment video communication over real-…
An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration Abstract?Induced by incorporating the powerful data storage and data processing abilities of cloud computing (CC) as well as ubiquitous data gathering capability of wireless sensor networks (WSNs), CC-WSN integration received a lot of attention from both academia and industry. However,…