Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks sequence and plain text Abstract?we propose redundancy management of heterogeneous wireless sensor networks (HWSNs), utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. The key concept of our redundancy management is to exploit the tradeoff between…
Reliability Evaluation of Large Scale Battery Energy Storage Systems Abstract? The reliability of large scale bat-tery storage systems consisting of multiple battery modules. The whole system reliability assessment is based on the reliability evaluation of system components including individual battery modules and power electronic converters. In order to evaluate the reliability of a battery module,…
Rescheduling of real power for congestion management with integration of pumped storage hydro unit using firefly algorithm Abstract?Abstract Post-deregulation era of power system operation produces more pressure on Independent System Operator (ISO) to ensure congestion free transmission network without destroying system security. Inorder to relieve transmission congestion, ISO initiates correct methods by maintaining system reliability…
Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior. A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes the temporal and spatial locality to extract the behavior features of the proxy-to-server traffic, which makes the scheme independent of the traffic intensity and…
Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory Abstract?Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory, In this paper, we propose a method of constructing a virtual coordinate system (ABVCap) in wireless sensor networks where location information is not available. A routing protocol based on ABVCap virtual…
Reversible Data Hiding in Encrypted Images by Reversible Image Transformation Abstract?Abstract With the popularity of outsourcing data to the cloud,it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the same time. Under such demands,reversible data hiding in encrypted images (RDH-EI) attracts more and more…
Review On- Netspam: A Network-Based Spam Detection Framework For Reviews In Online Social Media Abstract-Todays, a major part of everyone trusts on content in social media like opinions and feedbacks of a topic or a product. The liability that anyone can take off a survey give a brilliant chance to spammers to compose spam surveys…
RFID based tollgate collection system Abstract?RFID based tollgate collection system. A customized radio frequency identification (RFID)-based sensor system is proposed to achieve reliable data collection and transmission between downhole and ground for the intelligent oilwell. In this paper, the overall system architecture is introduced first, and then, the corresponding hardware systems are designed in detail….
RIHT:A Novel Hybrid ip tracebackscheme Abstract? Because the Internet has been widely applied in various fields, more and more network security issues emerge and catch people’s attention.< Final Year Project > However, adversaries often hide themselves by spoofing their own IP addresses and then launch attacks. For this reason, researchers have proposed a lot…
Robust Control for Microgrid Frequency Deviation Reduction With Attached Storage System Abstract? Robust Control for Microgrid Frequency Deviation Reduction With Attached Storage System. We propose a robust control strategy for reducing system frequency deviation, caused by load ?uctuation and renewable sources, in a smart microgrid system with attached storage. Frequency deviations are associated with renewable…
Robust Part-Based Hand Gesture Recognition Using Kinect Sensor Abstract? The recently developed depth sensors, e.g., the Kinect sensor, have provided new opportunities for human-computer interaction (HCI). Although great progress has been made by leveraging the Kinect sensor, e.g., in human body tracking, face recognition and human action recognition, robust hand gesture recognition remains an open…