Showing 361–372 of 451 results

  • PUBLIC AUDITING OF DYNAMIC BIG DATA ON CLOUD STORAGE

    PUBLIC AUDITING OF DYNAMIC BIG DATA ON CLOUD STORAGE

    0 out of 5
    4,500

    PUBLIC AUDITING OF DYNAMIC BIG DATA ON CLOUD STORAGE   Abstract?PUBLIC AUDITING OF DYNAMIC BIG DATA ON CLOUD STORAGE. Cloud computing that provides elastic computing and storage resource on demand has become increasingly important due to the emergence of ?big data?. Cloud computing resources are a natural fit for processing big data streams as they…

  • PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network

    PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network

    0 out of 5
    4,500

    PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network Abstract? PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network. Multipath routing in wireless multimedia sensor net-work makes it possible to transfer data simultaneously so as to reduce delay and congestion and it is worth researching. However, the current multipath routing strategy may cause…

  • Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases

    Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases

    0 out of 5
    5,500

    Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases Abstract? Resource Description Framework (RDF) has been widely used in the SemanticWeb to describe resources and their relationships. The RDF graph is one of the most commonly used representations for RDF data. However, in many real applications such as the data extraction/integration, RDF graphs integrated from different…

  • Quasi Y-Source Boost DC-DC Converter

    Quasi Y-Source Boost DC-DC Converter

    0 out of 5
    4,500

    Quasi Y-Source Boost DC-DC Converter Abstract? Quasi Y-Source Boost DC-DC Converter. A new topology called ?quasi-Y-source dc-dc converter? is presented. It inherits all the advantages of the original Y-source converter. In addition, the new topology draws a continuous current from the source, which is definitely more appropriate for most renewable sources. It also has dc-current…

  • RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks

    RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks

    0 out of 5
    4,500

    RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks Abstract? RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks. Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation…

  • Re-synchronization of Distributed Generation based Universal Droop Controller

    Re-synchronization of Distributed Generation based Universal Droop Controller

    0 out of 5
    4,500

    Resynchronization of Distributed Generation based on the Universal Droop Controller for Seamless Transfer Between Operation Modes Abstract-Distributed generation (DG) inverters can operate in the islanded mode and the grid-connected mode. When these DG inverters operate in the islanded mode, they often form a microgrid. The magnitude and phase of the main grid voltage deviate from…

  • Reactive Power Capacity Enhancement of a PV-Grid System to Increase PV Penetration Level in Smart Grid Scenario

    Reactive Power Capacity Enhancement of a PV-Grid System to Increase PV Penetration Level in Smart Grid Scenario

    0 out of 5
    4,500

    Reactive Power Capacity Enhancement of a PV-Grid System to Increase PV Penetration Level in Smart Grid Scenario Abstract?Existing standards impose limits on the allowable feeder voltage variation in a distributed generation environment. These stipulations must be respected by the distributed power generators (suppliers), which put a cap on the penetration level. A possible solution is…

  • Real-Time Scheduling with Security Enhancement for Packet Switched Networks

    Real-Time Scheduling with Security Enhancement for Packet Switched Networks

    0 out of 5
    4,500

    Real-Time Scheduling with Security Enhancement for Packet Switched Networks   Abstract? Real-time network applications depend on schedulers to guarantee the quality of service (QoS). Conventional real-time schedulers focus on the timing constraints but are much less effective in satisfying the security requirements. < Final Year Projects >In this paper, we propose an adaptive security-aware scheduling…

  • Real-Time Signal Quality-Aware ECG Telemetry System for IoT-Based Health Care Monitoring

    Real-Time Signal Quality-Aware ECG Telemetry System for IoT-Based Health Care Monitoring

    0 out of 5
    4,500

    Real-Time Signal Quality-Aware ECG Telemetry System for IoT-Based Health Care Monitoring Abstract-In the first place, propose a novel signal qualityaware IoT-enabled ECG telemetry system for continuous cardiac health monitoring applications. The proposed quality-aware ECG monitoring system consists of three modules: ECG signal sensing module; automated signal quality assessment module; and signal-quality aware ECG analysis and…

  • REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

    REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

    0 out of 5
    4,500

    REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks Abstract? REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized…

  • Realtime Scheduling with security enhancement in packet switched networks

    Realtime Scheduling with security enhancement in packet switched networks

    0 out of 5
    4,500

    Realtime Scheduling with security enhancement in packet switched networks   Abstract? Real-time network applications depend on schedulers to guarantee the quality of service (QoS). Conventional real-time schedulers focus on the timing constraints but are much less effective in satisfying the security requirements. < Final Year Project > In this paper, we propose an adaptive security-aware…

  • Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    0 out of 5
    4,500

    Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks Abstract? Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video…

End of content

End of content