Transformer-Less Unified Power-Flow Controller Using the Cascade Multilevel Inverter Abstract?The conventional unified power-flow controller (UPFC) that consists of two back-to-back inverters requires bulky and often complicated zigzag transformers for isolation and reaching high voltage. < final year projects > View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides…
Transparently Exploiting Device-Reserved Memory for Application Performance in Mobile System Abstract? Most embedded systems require contiguous memory space to be reserved for devices, which may lead to memory under-utilization. Although several approaches have been proposed to address this issue, they have limitations of either inefficient memory usage or long latency for switching the reserved memory…
Travel Guide (Android App) Abstract-This project android travel guide provides the tourist with city map depending on its current location entered by the android phone user. This information helps the tourists to find the desired locations to visit. Well it consists of entire details of those locations or how to reach the location but it…
Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing Abstract? Cloud service certifications (CSC) attempt to assure a high level of security and compliance. However, considering that cloud services are part of an ever-changing environment, multi-year validity periods may put in doubt reliability of such certifications. We argue that continuous auditing (CA)…
Trust Management for Vehicular Networks: An Adversary-Oriented Overview Abstract– Cooperative Intelligent Transportation Systems, mainly represented by vehicular ad hoc networks (VANETs), are among the key components contributing to the Smart City and Smart World paradigms. Based on the continuous exchange of both periodic and event triggered messages, smart vehicles can enhance road safety, while also…
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm Abstract?Cloud computing is popularizing the computing paradigm in which data is outsourced to a third-party service provider (server) for data mining. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database…
Trustworthy Parking Communities: Helping Your Neighbor to Find a Space Abstract?Cooperation between vehicles facilitates traffic management, road safety and infotainment applications. Cooperation, however, requires trust in the validity of the received information. In this paper, we tackle the challenge of securely exchanging parking spot availability information. Trust is crucial in order to support the decision…
Trustworthy Parking Communities: Helping Your Neighbor to Find a Spaces Abstract?Abstract Cooperation between vehicles facilitates traffic management, road safety and infotainment applications. Cooperation,however, requires trust in the validity of the received information. In this paper, we tackle the challenge of securely exchanging parking spot availability information. Trust is crucial in order to support the decision…
Truth Discovery in Crowdsourced Detection of Spatial Events Abstract? The ubiquity of smartphones has led to the emergence of mobile crowdsourcing tasks such as the detection of spatial events when smartphone users move around in their daily lives. However, the credibility of those detected events can be negatively impacted by unreliable participants with low-quality data….
Two 122-GHz Phase-Locked Loops in 65-nm CMOS Technology Abstract? Two 122-GHz phase-locked loops (PLLs) have been developed based on a 65-nm Si CMOS technology, and their performances are compared. For the first PLL, a voltage-controlled oscillator (VCO) with a frequency doubler embedded in the oscillator core was employed (PLL1), while the second PLL employs a…
Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems Abstract?Attribute-based encryption, especially for ciphertext-policy attribute-based encryption, can fulfill the functionality of fine-grained access control in cloud storage systems. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…