Showing 481–492 of 2014 results

  • Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management

    Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management

    0 out of 5
    4,500

    Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management Abstract? Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management. With BitTorrent, efficient peer upload utilization is achieved by splitting contents into many small pieces, each of which may be downloaded from different peers within the same swarm. Unfortunately, piece and bandwidth availability may cause the…

  • Centralized resource information for old age home

    Centralized resource information for old age home

    0 out of 5
    3,500

    Centralized resource information for old age home Abstract?Centralized resource information for old age home. We present design and implementation of CyPhyS+, a comprehensive, low-cost and standard complaint Cyber-Physical System for remote health monitoring of elderly staying in old age homes. It is an end-to-end 6LoWPAN based healthcare system, which provides reliable and secured medical data…

  • Centroid Ratio for a Pairwise Random Swap Clustering Algorithm

    Centroid Ratio for a Pairwise Random Swap Clustering Algorithm

    0 out of 5
    4,500

    Centroid Ratio for a Pairwise Random Swap Clustering Algorithm Abstract?Centroid Ratio for a Pairwise Random Swap Clustering Algorithm. Clustering algorithm and cluster validity are two highly correlated parts in cluster analysis. In this paper, a novel idea for cluster validity and a clustering algorithm based on the validity index are introduced. A Centroid Ratio is…

  • Channel Estimation/Equalization with Adaptive  Modulation and Coding over Multipath Faded  Channels for WiMAX

    Channel Estimation/Equalization with Adaptive Modulation and Coding over Multipath Faded Channels for WiMAX

    0 out of 5
    4,500

    Channel Estimation/Equalization with Adaptive Modulation and Coding over Multipath Faded Channels for WiMAX Abstract? Channel Estimation/Equalization with Adaptive Modulation and Coding over Multipath Faded Channels for WiMAX. Different order modulations combined with different coding schemes, allow sending more bits per symbol, thus achieving higher throughputs and better spectral efficiencies. However, it must also be noted…

  • Channel Quantization Using Constellation Based Codebooks for Multiuser MIMO-OFDM

    Channel Quantization Using Constellation Based Codebooks for Multiuser MIMO-OFDM

    0 out of 5
    4,500

    Channel Quantization Using Constellation Based Codebooks for Multiuser MIMO-OFDM Abstract?Channel Quantization Using Constellation Based Codebooks for Multiuser MIMO-OFDM. In this paper, we propose clustered quantization techniques for multiuser multi-input/multi-output (MIMO) orthogonal frequency division multiplexing (OFDM) using constellation based codebooks. Constellation based codebooks provide scalability and efficient codeword search capability, < Final Year Projects > which…

  • Channel-Aware Opportunistic Transmission Scheduling for Energy-Efficient Wireless Links

    Channel-Aware Opportunistic Transmission Scheduling for Energy-Efficient Wireless Links

    0 out of 5
    4,500

    Channel-Aware Opportunistic Transmission Scheduling for Energy-Efficient Wireless Links Abstract– Channel-Aware Opportunistic Transmission Scheduling for Energy-Efficient Wireless Links. The limited battery lifetime of a wireless device, which is directly related to the power consumption of the device, imposes a constraint on network performance. Thus, one of the most significant objectives in wireless communication networks is to…

  • CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability

    CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability

    0 out of 5
    4,500

    CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability Abstract? CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability. Nowadays, more and more enterprises and organizations are hosting their data into the cloud, in order to reduce the IT maintenance cost and enhance the data reliability. However, facing the numerous cloud vendors as…

  • CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability

    CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability

    0 out of 5
    4,500

    CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability Abstract? More and more enterprises and organizations are hosting their data into the cloud, in order to reduce the IT maintenance cost and enhance the data reliability. However, facing the numerous cloud vendors as well as their heterogenous pricing policies, customers may well be perplexed…

  • Chatting Application Using Google Cloud  Messaging

    Chatting Application Using Google Cloud Messaging

    0 out of 5
    3,500

    Chatting Application Using Google Cloud Messaging Abstract? Chat Application using Google Cloud Messaging.A GCM implementation includes a Google connection server, an app server in your environment that interacts with the connection server via HTTP or XMPP protocol, and a client app. Google GCM Connection Servers take messages from your app server and send them to…

  • Chatting Application Using Google Cloud Messaging

    Chatting Application Using Google Cloud Messaging

    0 out of 5
    3,500

    Chatting Application Using Google Cloud Messaging Abstract? Chatting Application Using Google Cloud Messaging. Google Cloud Messaging < Final Year Projects 2016 > GCM is a free service that enables users to send messages between servers and client apps. This includes downstream messages from servers to client apps, and upstream messages from client apps to servers….

  • CIDS-A framework for intrusion detection in cloud system

    CIDS-A framework for intrusion detection in cloud system

    0 out of 5
    4,500

    CIDS-A framework for intrusion detection in cloud system   Abstract? By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for “CIDS” a cloud based intrusion detection system, to solve the deficiencies of current IDSs.< Final Year Projects > CIDS also provides a component to summarize…

  • CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution

    CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution

    0 out of 5
    4,500

    CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution Abstract?CipherXRay: Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic algorithms (e.g., packing, encrypting C&C communication) to protect themselves from being analyzed. The use of cryptographic algorithms and truly transient cryptographic secrets inside the malware binary imposes a key obstacle to…

End of content

End of content