Showing 1261–1272 of 1333 results

  • Towards Secure Data Distribution Systems in Mobile Cloud Computing

    0 out of 5
    4,500

    Towards Secure Data Distribution Systems in Mobile Cloud Computing Abstract– In the first place, cloud computing is though the electronic technologies have undergone fast developments in recent years, mobile devices such as smartphones are still comparatively weak in contrast to desktops in terms of computational capability, storage etc, and are not able to meet the…

  • Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs

    0 out of 5
    4,500

    Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs Abstract-In the first place, address the problem of preventing the inference of contextual information in event-driven wireless sensor networks (WSNs). The problem is considered under a global eavesdropper who analyzes low-level RF transmission attributes, such as the number of transmitted packets, inter-packet times, and traffic…

  • Transformer-Less Unified Power-Flow Controller Using the Cascade Multilevel Inverter

    0 out of 5
    5,500

    Transformer-Less Unified Power-Flow Controller Using the Cascade Multilevel Inverter Abstract?The conventional unified power-flow controller (UPFC) that consists of two back-to-back inverters requires bulky and often complicated zigzag transformers for isolation and reaching high voltage. < final year projects > View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides…

  • Transparently Exploiting Device-Reserved Memory for Application Performance in Mobile System

    0 out of 5
    5,500

    Transparently Exploiting Device-Reserved Memory for Application Performance in Mobile System Abstract? Most embedded systems require contiguous memory space to be reserved for devices, which may lead to memory under-utilization. Although several approaches have been proposed to address this issue, they have limitations of either inefficient memory usage or long latency for switching the reserved memory…

  • TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks

    0 out of 5
    5,500

    TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks Abstract? A distributed topology management scheme in wireless multimedia sensor networks (WMSNs) ensures coverage of an event, prolongs network lifetime, and maintains connectivity between camera sensor (CS) nodes. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete…

  • Travel Guide (Android App)

    0 out of 5
    5,500

    Travel Guide (Android App) Abstract-This project android travel guide provides the tourist with city map depending on its current location entered by the android phone user. This information helps the tourists to find the desired locations to visit. Well it consists of entire details of those locations or how to reach the location but it…

  • Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing

    0 out of 5
    5,500

    Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing Abstract? Cloud service certifications (CSC) attempt to assure a high level of security and compliance. However, considering that cloud services are part of an ever-changing environment, multi-year validity periods may put in doubt reliability of such certifications. We argue that continuous auditing (CA)…

  • Trust Management for Vehicular Networks: An Adversary-Oriented Overview

    0 out of 5
    4,500

    Trust Management for Vehicular Networks: An Adversary-Oriented Overview Abstract– Cooperative Intelligent Transportation Systems, mainly represented by vehicular ad hoc networks (VANETs), are among the key components contributing to the Smart City and Smart World paradigms. Based on the continuous exchange of both periodic and event triggered messages, smart vehicles can enhance road safety, while also…

  • Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm

    0 out of 5
    5,500

    Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm Abstract?Cloud computing is popularizing the computing paradigm in which data is outsourced to a third-party service provider (server) for data mining. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database…

  • Trustworthy Parking Communities: Helping Your Neighbor to Find a Space

    0 out of 5
    5,500

    Trustworthy Parking Communities: Helping Your Neighbor to Find a Space Abstract?Cooperation between vehicles facilitates traffic management, road safety and infotainment applications. Cooperation, however, requires trust in the validity of the received information. In this paper, we tackle the challenge of securely exchanging parking spot availability information. Trust is crucial in order to support the decision…

  • Trustworthy Parking Communities: Helping Your Neighbor to Find a Space

    0 out of 5
    5,500

    Trustworthy Parking Communities: Helping Your Neighbor to Find a Spaces Abstract?Abstract Cooperation between vehicles facilitates traffic management, road safety and infotainment applications. Cooperation,however, requires trust in the validity of the received information. In this paper, we tackle the challenge of securely exchanging parking spot availability information. Trust is crucial in order to support the decision…

  • Truth Discovery in Crowdsourced Detection of Spatial Events

    0 out of 5
    5,500

    Truth Discovery in Crowdsourced Detection of Spatial Events Abstract? The ubiquity of smartphones has led to the emergence of mobile crowdsourcing tasks such as the detection of spatial events when smartphone users move around in their daily lives. However, the credibility of those detected events can be negatively impacted by unreliable participants with low-quality data….

End of content

End of content