PUBLIC AUDITING OF DYNAMIC BIG DATA ON CLOUD STORAGE Abstract?PUBLIC AUDITING OF DYNAMIC BIG DATA ON CLOUD STORAGE. Cloud computing that provides elastic computing and storage resource on demand has become increasingly important due to the emergence of ?big data?. Cloud computing resources are a natural fit for processing big data streams as they…
PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network Abstract? PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network. Multipath routing in wireless multimedia sensor net-work makes it possible to transfer data simultaneously so as to reduce delay and congestion and it is worth researching. However, the current multipath routing strategy may cause…
Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases Abstract? Resource Description Framework (RDF) has been widely used in the SemanticWeb to describe resources and their relationships. The RDF graph is one of the most commonly used representations for RDF data. However, in many real applications such as the data extraction/integration, RDF graphs integrated from different…
Quasi Y-Source Boost DC-DC Converter Abstract? Quasi Y-Source Boost DC-DC Converter. A new topology called ?quasi-Y-source dc-dc converter? is presented. It inherits all the advantages of the original Y-source converter. In addition, the new topology draws a continuous current from the source, which is definitely more appropriate for most renewable sources. It also has dc-current…
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks Abstract? RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks. Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation…
Resynchronization of Distributed Generation based on the Universal Droop Controller for Seamless Transfer Between Operation Modes Abstract-Distributed generation (DG) inverters can operate in the islanded mode and the grid-connected mode. When these DG inverters operate in the islanded mode, they often form a microgrid. The magnitude and phase of the main grid voltage deviate from…
Reactive Power Capacity Enhancement of a PV-Grid System to Increase PV Penetration Level in Smart Grid Scenario Abstract?Existing standards impose limits on the allowable feeder voltage variation in a distributed generation environment. These stipulations must be respected by the distributed power generators (suppliers), which put a cap on the penetration level. A possible solution is…
Real-Time Scheduling with Security Enhancement for Packet Switched Networks Abstract? Real-time network applications depend on schedulers to guarantee the quality of service (QoS). Conventional real-time schedulers focus on the timing constraints but are much less effective in satisfying the security requirements. < Final Year Projects >In this paper, we propose an adaptive security-aware scheduling…
Real-Time Signal Quality-Aware ECG Telemetry System for IoT-Based Health Care Monitoring Abstract-In the first place, propose a novel signal qualityaware IoT-enabled ECG telemetry system for continuous cardiac health monitoring applications. The proposed quality-aware ECG monitoring system consists of three modules: ECG signal sensing module; automated signal quality assessment module; and signal-quality aware ECG analysis and…
REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks Abstract? REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized…
Realtime Scheduling with security enhancement in packet switched networks Abstract? Real-time network applications depend on schedulers to guarantee the quality of service (QoS). Conventional real-time schedulers focus on the timing constraints but are much less effective in satisfying the security requirements. < Final Year Project > In this paper, we propose an adaptive security-aware…