Showing 37–48 of 207 results

  • Balancing Blocks for Distributed File System in Clouds by Using Load Rebalancing Algoritham

    Balancing Blocks for Distributed File System in Clouds by Using Load Rebalancing Algoritham

    0 out of 5
    4,500

    Balancing Blocks for Distributed File System in Clouds by Using Load Rebalancing Algoritham Abstract? : Balancing Blocks for Distributed File System in Clouds by Using Load Rebalancing Algoritham. Distributed file systems are key building blocks for cloud computing applications based on the MapReduce programming paradigm. In such file systems, nodes simultaneously serve computing and storage…

  • Bandwidth Recycling in project 802.16 Networks

    Bandwidth Recycling in project 802.16 Networks

    0 out of 5
    4,500

    Bandwidth Recycling in IEEE 802.16 Networks Abstract?Bandwidth Recycling in project 802.16 Networks Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On Demand…

  • Body Node Coordinator Placement Algorithms for Wireless Body Area Networks

    Body Node Coordinator Placement Algorithms for Wireless Body Area Networks

    0 out of 5
    4,500

    Body Node Coordinator Placement Algorithms for Wireless Body Area Networks Abstract? Body Node Coordinator Placement Algorithms for Wireless Body Area Networks. Wireless body area networks < Final Year Projects 2016 > WBANs are intelligent wireless monitoring systems, consisting of wearable, and implantable computing devices on or in the human body. They are used to support…

  • Botnet Detection based on Anomaly and Community Detection

    Botnet Detection based on Anomaly and Community Detection

    0 out of 5
    5,500

    Botnet Detection based on Anomaly and Community Detection Abstract? A novel two-stage approach for the important cyber-security problem of detecting the presence of a botnet and identifying the compromised nodes (the bots), ideally before the botnet becomes active. The first stage detects anomalies by leveraging large deviations of an empirical distribution. We propose two approaches…

  • Botnet Detection based on Anomaly and Community Detection

    Botnet Detection based on Anomaly and Community Detection

    0 out of 5
    5,500

    Botnet Detection based on Anomaly and Community Detection Abstract? A novel two-stage approach for the important cyber-security problem of detecting the presence of a botnet and identifying the compromised nodes (the bots), ideally before the botnet becomes active. The first stage detects anomalies by leveraging large deviations of an empirical distribution. We propose two approaches…

  • BURSE: A Bursty andSelf-Similar Workload Generator for Cloud Computing

    BURSE: A Bursty andSelf-Similar Workload Generator for Cloud Computing

    0 out of 5
    4,500

    BURSE: A Bursty andSelf-Similar Workload Generator for Cloud Computing Abstract? BURSE: A Bursty andSelf-Similar Workload Generator for Cloud Computing. As two of the most important characteristics of workloads, burstiness and self-similarity are gaining more and more attention. Workload generation, which is a key technique for performance analysis and simulations, has also attracted an increasing interest…

  • CEDAR: A Low-Latency and Distributed Strategy for Packet Recovery in Wireless Networks

    CEDAR: A Low-Latency and Distributed Strategy for Packet Recovery in Wireless Networks

    0 out of 5
    4,500

    CEDAR: A Low-Latency and Distributed Strategy for Packet Recovery in Wireless Networks Abstract? Underlying link-layer protocols of well-established wireless networks that use the conventional ?store-and-forward? design paradigm cannot provide highly sustainable reliability and stability in wireless communication, which introduce signi?cant barriers and setbacks in scalability and deployments of wireless networks. In this paper, we propose…

  • Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management

    Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management

    0 out of 5
    4,500

    Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management Abstract? Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management. With BitTorrent, efficient peer upload utilization is achieved by splitting contents into many small pieces, each of which may be downloaded from different peers within the same swarm. Unfortunately, piece and bandwidth availability may cause the…

  • CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution

    CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution

    0 out of 5
    4,500

    CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution Abstract? CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections]…

  • Cloud Centric Authentication for Wearable Healthcare Monitoring System

    Cloud Centric Authentication for Wearable Healthcare Monitoring System

    0 out of 5
    4,500

    Cloud Centric Authentication for Wearable Healthcare Monitoring System Abstract-Security and privacy are the major concerns in cloud computing as users have limited access on the stored data at the remote locations managed by different service providers.These become more challenging especially for the data generated from the wearable devices as it is highly sensitive and heterogeneous…

  • Coalescing Clustering and Classi?cation

    Coalescing Clustering and Classi?cation

    0 out of 5
    4,500

    Coalescing Clustering and Classi?cation Abstract?Coalescing Clustering and Classi?cation. In Data Mining Clustering and Classification are two important techniques. In this paper we make use of large database (Diabetes dataset containing) to perform an integration of clustering and classification technique. We compared the results of simple classification technique (J48 classifier) with the results of integration of…

  • CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes

    CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes

    0 out of 5
    4,500

    CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes Abstract? CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes. Mobile ad-hoc networks < Final Year Projects 2016 > MANETs assume that mobile nodes voluntary cooperate in order to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to…

End of content

End of content