Showing 229–240 of 2138 results

  • Placeholder

    A Trajectory Privacy-Preserving Framework for Participatory Sensing

    0 out of 5
    4,500

    A Trajectory Privacy-Preserving Framework for Participatory Sensing. The ubiquity of the various cheap embedded sensors on mobile devices, for example cameras, microphones, accelerometers, and so on, is enabling the emergence of participatory sensing applications. While participatory sensing can benefit the individuals and communities greatly, the collection and analysis of the participators’ location and trajectory data…

  • Placeholder

    A Transformerless Grid-Connected Photovoltaic System Based on the Coupled Inductor Single-Stage Boost Three-Phase Inverter

    0 out of 5
    4,500

    A Transformerless Grid-Connected Photovoltaic System Based on the Coupled Inductor Single-Stage Boost Three-Phase Inverter Abstract? A Transformerless Grid-Connected Photovoltaic System Based on the Coupled Inductor Single-Stage Boost Three-Phase Inverter. This letter presents a modulation technique for the modified coupled-inductor single-stage boost inverter (CL-SSBI)-based grid-connected photovoltaic (PV) system. This technique can reduce the system leakage current…

  • A Trigger Identification Service for Defending Reactive Jammers in WSN

    0 out of 5
    4,500

    A Trigger Identification Service for Defending Reactive Jammers in WSN Abstract?A Trigger Identification Service for Defending Reactive Jammers in WSN. During the last decade, Reactive Jamming Attack has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. Considering…

  • A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks

    0 out of 5
    4,500

    A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks Abstract? A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks. In the harsh environment where node density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join…

  • A Two-Level FH-CDMA Scheme for Wireless Communication Systems over Fading Channels

    0 out of 5
    4,500

    A Two-Level FH-CDMA Scheme for Wireless Communication Systems over Fading Channels Abstract– A Two-Level FH-CDMA Scheme for Wireless Communication Systems over Fading Channels. In this paper, we propose a “two-level” frequency-hopping code-division multiple-access (FH-CDMA) scheme for wireless communication systems. The new scheme provides flexibility in the selection of modulation codes and FH patterns. By partitioning…

  • Placeholder

    A Two-Level Topic Model Towards Knowledge Discovery from Citation Networks

    0 out of 5
    4,500

    A Two-Level Topic Model Towards Knowledge Discovery from Citation Networks Abstract? A Two-Level Topic Model Towards Knowledge Discovery from Citation Networks. Knowledge discovery from scientific articles has received increasing attention recently since huge repositories are made available by the development of the Internet and digital databases. In a corpus of scientific articles such as a…

  • A Two-Tiered On-Demand Resource Allocation Mechanism for VM-Based Data Centers

    0 out of 5
    4,500

    A Two-Tiered On-Demand Resource Allocation Mechanism for VM-Based Data Centers Abstract?A Two-Tiered On-Demand Resource Allocation Mechanism for VM-Based Data Centers. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our…

  • Placeholder

    A Unifying Model and Analysis of P2P VoD Replication and Scheduling

    0 out of 5
    4,500

    A Unifying Model and Analysis of P2P VoD Replication and Scheduling Abstract?A Unifying Model and Analysis of P2P VoD Replication and Scheduling. We consider a peer-to-peer (P2P)-assisted video-on-demand (VoD) system where each peer can store a relatively small number of movies to offload the server when these movies are requested. User requests are stochastic based…

  • Placeholder

    A Unifying Model and Analysis of P2P VoD Replication and Scheduling

    0 out of 5
    4,500

    A Unifying Model and Analysis of P2P VoD Replication and Scheduling Abstract?We consider a peer-to-peer (P2P)-assisted video-on-demand (VoD) system where each peer can store a relatively small number of movies to offload the server when these movies are requested. User requests are stochastic based on some movie popularity distribution. The problem is how to replicate…

  • A Universal Fairness Evaluation Framework for Resource Allocation in Cloud Computing

    0 out of 5
    4,500

    A Universal Fairness Evaluation Framework for Resource Allocation in Cloud Computing Abstract? In cloud computing, fairness is one of the most significant indicators to evaluate resource allocation algorithms, which reveals whether each user is allocated as much as that of all other users having the same bottleneck. However, how fair an allocation algorithm is remains…

  • A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless Cellular Networks

    0 out of 5
    4,500

    A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless Cellular Networks Abstract?Multicast/broadcast is regarded as an efficient technique for wireless cellular networks to transmit a large volume of common data to multiple mobile users simultaneously. To guarantee the quality of service for each mobile user in such single-hop multicasting, the base-station transmitter…

  • A Virtual Coordinate-Based Bypassing Void Routing for Wireless Sensor Networks

    0 out of 5
    4,500

    A Virtual Coordinate-Based Bypassing Void Routing for Wireless Sensor Networks Abstract? To solve the routing void problem in geographic routing, high control overhead and transmission delay are usually taken in wireless sensor networks. Inspired by the structure composed of edge nodes around which there is no routing void, an ef?cient bypassing void routing protocol based…

End of content

End of content