Showing 529–540 of 665 results

  • Placeholder

    Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    0 out of 5
    4,500

    Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks sequence and plain text Abstract?we propose redundancy management of heterogeneous wireless sensor networks (HWSNs), utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. The key concept of our redundancy management is to exploit the tradeoff between…

  • Relaxed Min-Max Decoder Architectures for Nonbinary Low-Density Parity-Check Codes

    0 out of 5
    4,500

    Relaxed Min-Max Decoder Architectures for Nonbinary Low-Density Parity-Check Codes. Compared to binary low-density parity-check (LDPC) codes, nonbinary (NB) LDPC codes can achieve higher coding gain when the codeword length is moderate, but at the cost of higher decoding complexity. One major bottleneck of NB-LDPC decoding is the complicated check node processing. In this paper, a…

  • Reliability-Based Design Optimization for Cloud Migration

    0 out of 5
    4,500

    Reliability-Based Design Optimization for Cloud Migration Abstract?The on-demand use, high scalability, and low maintenance cost nature of cloud computing have attracted more and more enterprises to migrate their legacy applications to the cloud environment. Although the cloud platform itself promises high reliability, ensuring high quality of service is still one of the major concerns, since…

  • Placeholder

    Removal of Ocular Artifacts in EEG?An Improved Approach Combining DWT and ANC for Portable Applications

    0 out of 5
    4,500

    Removal of Ocular Artifacts in EEG?An Improved Approach Combining DWT and ANC for Portable Applications Abstract-A new model to remove ocular artifacts (OA) from electroencephalograms (EEGs) is presented. The model is based on discrete wavelet transformation (DWT) and adaptive noise cancellation (ANC). Using simulated and measured data, the accuracy of the model is compared with…

  • Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems

    0 out of 5
    4,500

    Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems Abstract? Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems. Web service recommendation systems can help service users to locate the right service from the large number of available web services. Avoiding recommending dishonest or unsatisfactory services is a fundamental…

  • Placeholder

    Research on Data Fusion Method for Archaeological Site Identification

    0 out of 5
    4,500

    Research on Data Fusion Method for Archaeological Site Identification Abstract?China is the only country in the world with continuous ancient civilization whose history can be traced for more than 5000 years. With the rapid development of remote sensing, abundant remote sensing data of the same site by different remote sensors are available at the same…

  • Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior

    0 out of 5
    4,500

    Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior. A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes the temporal and spatial locality to extract the behavior features of the proxy-to-server traffic, which makes the scheme independent of the traffic intensity and…

  • Placeholder

    Retrieval Of Textual And Non-Textual Information In Cloud

    0 out of 5
    4,500

    Retrieval Of Textual And Non-Textual Information In Cloud Abstract?With the advent of the Internet there is an exponential growth in multimedia content in various databases,which has a major issue in effective access and etrieval of both textual and non-textual resources.< Final Year Project >To resolve this problem information is stored in the cloud environment.From Internet…

  • Placeholder

    Retrieval-Based Face Annotation by Weak Label Regularized Local Coordinate Coding

    0 out of 5
    4,500

    Retrieval-Based Face Annotation by Weak Label Regularized Local Coordinate Coding Abstract? Retrieval-Based Face Annotation by Weak Label Regularized Local Coordinate Coding. Auto face annotation, which aims to detect human faces from a facial image and assign them proper human names, is a fundamental research problem and beneficial to many real-world applications. In this work, we…

  • Rich Receiver initial client head multicast approach for grid application

    0 out of 5
    4,500

    Rich Receiver initial client head multicast approach for grid application Abstract? Rich Receiver initial client head multicast approach for grid application Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • Placeholder

    RIHT:A Novel Hybrid ip tracebackscheme

    0 out of 5
    4,500

    RIHT:A Novel Hybrid ip tracebackscheme Abstract? Because the Internet has been widely applied in various fields, more and more network security issues emerge and catch people’s attention.< Final Year Project > However, adversaries often hide themselves by spoofing their own IP addresses and then launch attacks. For this reason, researchers have proposed a lot of…

  • Risk Aware Query Replacement Approach For Secure Databases Performance Management

    0 out of 5
    4,500

    Risk Aware Query Replacement Approach For Secure Databases Performance Management Abstract?Risk Aware Query Replacement Approach For Secure Databases Performance Management. Large amount of data and increased demand to extract, < Final Year Projects > analyze and derive knowledge from data are impairing nowadays performance of enterprise mission-critical systems such as databases. For databases, the challenging…

End of content

End of content