Showing 373–384 of 451 results

  • Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    0 out of 5
    4,500

    Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks sequence and plain text Abstract?we propose redundancy management of heterogeneous wireless sensor networks (HWSNs), utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. The key concept of our redundancy management is to exploit the tradeoff between…

  • Reliability Evaluation of Large Scale Battery Energy Storage Systems

    Reliability Evaluation of Large Scale Battery Energy Storage Systems

    0 out of 5
    5,500

    Reliability Evaluation of Large Scale Battery Energy Storage Systems Abstract? The reliability of large scale bat-tery storage systems consisting of multiple battery modules. The whole system reliability assessment is based on the reliability evaluation of system components including individual battery modules and power electronic converters. In order to evaluate the reliability of a battery module,…

  • Rescheduling of real power for congestion management with integration of pumped storage hydro unit using firefly algorithm

    Rescheduling of real power for congestion management with integration of pumped storage hydro unit using firefly algorithm

    0 out of 5
    5,500

    Rescheduling of real power for congestion management with integration of pumped storage hydro unit using firefly algorithm Abstract?Abstract Post-deregulation era of power system operation produces more pressure on Independent System Operator (ISO) to ensure congestion free transmission network without destroying system security. Inorder to relieve transmission congestion, ISO initiates correct methods by maintaining system reliability…

  • Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior

    Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior

    0 out of 5
    4,500

    Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior. A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes the temporal and spatial locality to extract the behavior features of the proxy-to-server traffic, which makes the scheme independent of the traffic intensity and…

  • Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory

    Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory

    0 out of 5
    4,500

    Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory Abstract?Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory, In this paper, we propose a method of constructing a virtual coordinate system (ABVCap) in wireless sensor networks where location information is not available. A routing protocol based on ABVCap virtual…

  • Reversible Data Hiding in Encrypted Images by Reversible Image Transformation

    Reversible Data Hiding in Encrypted Images by Reversible Image Transformation

    0 out of 5
    5,500

    Reversible Data Hiding in Encrypted Images by Reversible Image Transformation Abstract?Abstract With the popularity of outsourcing data to the cloud,it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the same time. Under such demands,reversible data hiding in encrypted images (RDH-EI) attracts more and more…

  • Review On- Netspam: A Network-Based Spam Detection Framework For Reviews In Online Social Media

    Review On- Netspam: A Network-Based Spam Detection Framework For Reviews In Online Social Media

    0 out of 5
    4,500

    Review On- Netspam: A Network-Based Spam Detection Framework For Reviews In Online Social Media Abstract-Todays, a major part of everyone trusts on content in social media like opinions and feedbacks of a topic or a product. The liability that anyone can take off a survey give a brilliant chance to spammers to compose spam surveys…

  • RFID based tollgate collection system

    RFID based tollgate collection system

    0 out of 5
    4,500

    RFID based tollgate collection system Abstract?RFID based tollgate collection system. A customized radio frequency identification (RFID)-based sensor system is proposed to achieve reliable data collection and transmission between downhole and ground for the intelligent oilwell. In this paper, the overall system architecture is introduced first, and then, the corresponding hardware systems are designed in detail….

  • Rich Receiver initial client head multicast approach for grid application

    Rich Receiver initial client head multicast approach for grid application

    0 out of 5
    4,500

    Rich Receiver initial client head multicast approach for grid application Abstract? Rich Receiver initial client head multicast approach for grid application Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • RIHT:A Novel Hybrid ip tracebackscheme

    RIHT:A Novel Hybrid ip tracebackscheme

    0 out of 5
    4,500

    RIHT:A Novel Hybrid ip tracebackscheme   Abstract? Because the Internet has been widely applied in various fields, more and more network security issues emerge and catch people’s attention.< Final Year Project > However, adversaries often hide themselves by spoofing their own IP addresses and then launch attacks. For this reason, researchers have proposed a lot…

  • Robust Control for Microgrid Frequency Deviation Reduction With Attached Storage System

    Robust Control for Microgrid Frequency Deviation Reduction With Attached Storage System

    0 out of 5
    4,500

    Robust Control for Microgrid Frequency Deviation Reduction With Attached Storage System Abstract? Robust Control for Microgrid Frequency Deviation Reduction With Attached Storage System. We propose a robust control strategy for reducing system frequency deviation, caused by load ?uctuation and renewable sources, in a smart microgrid system with attached storage. Frequency deviations are associated with renewable…

  • Robust Part-Based Hand Gesture Recognition Using Kinect Sensor

    Robust Part-Based Hand Gesture Recognition Using Kinect Sensor

    0 out of 5
    4,500

    Robust Part-Based Hand Gesture Recognition Using Kinect Sensor Abstract? The recently developed depth sensors, e.g., the Kinect sensor, have provided new opportunities for human-computer interaction (HCI). Although great progress has been made by leveraging the Kinect sensor, e.g., in human body tracking, face recognition and human action recognition, robust hand gesture recognition remains an open…

End of content

End of content