Showing 2161–2166 of 2166 results

  • White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures

    0 out of 5
    4,500

    White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures Abstract? White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • Wireless Resource Allocation in Next Generation Healthcare Facilities

    0 out of 5
    4,500

    Wireless Resource Allocation in Next Generation Healthcare Facilities Abstract? Wireless Resource Allocation in Next Generation Healthcare Facilities. Healthcare facilities with intelligent wireless devices can reduce the workload of the paramedic staff. These devices include low-power wireless sensors, personal wireless hub (PWH), and receivers. The PWH can act as a relay in the hospital network. To…

  • Word Segmentation Method for Handwritten Documents based on Structured Learning

    0 out of 5
    4,500

    Word Segmentation Method for Handwritten Documents based on Structured Learning Abstract? Word Segmentation Method for Handwritten Documents based on Structured Learning. Segmentation of handwritten document imagesinto text-lines and words is an essential task for optical character recognition. However, since the features of handwritten document are irregular and diverse depending on the person, it is considered…

  • Workload-Based Software Rejuvenation in Cloud Systems

    0 out of 5
    4,500

    Workload-Based Software Rejuvenation in Cloud Systems Abstract? Workload-Based Software Rejuvenation in Cloud Systems. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On…

  • Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

    0 out of 5
    4,500

    Wormhole Attack Detection Algorithms in Wireless Network Coding Systems Abstract?Wormhole Attack Detection Algorithms in Wireless Network Coding Systems. Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that…

  • Wormhole Attack Detection Algorithms in WirelessNetwork Coding Systems

    0 out of 5
    4,500

    Wormhole Attack Detection Algorithms in WirelessNetwork Coding Systems Abstract?Wormhole Attack Detection Algorithms in WirelessNetwork Coding Systems. Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the < Final Year Projects > well-studied pollution attacks, there is another…

End of content

End of content