A Time Ef?cient Approach for Detecting Errors in Big Sensor Data on Cloud Abstract? A Time Ef?cient Approach for Detecting Errors in Big Sensor Data on Cloud. Big sensor data is prevalent in both industry and scienti?c research applications where the data is generated with high volume and velocity it is dif?cult to process using…
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud Abstract?A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud. Big sensor data is prevalent in both industry and scientific research applications where the data is generated with high volume and velocity it is difficult to process using on-hand…
A Toolkit for Modeling and Simulation of Real-Time Virtual Machine Allocation in a Cloud Data Center Abstract?A Toolkit for Modeling and Simulation of Real-Time Virtual Machine Allocation in a Cloud Data Center. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution…
A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold Abstract? Location Based Reminder is a feature in a software program that uses the global positioning system identification to remind the important reminders for the particular locations. Programs that incorporate geo-fencing allow an administrator to set up triggers so when a device enters…
A Traffic Adaptive Multi-channel MAC Protocol with Dynamic Slot Allocation for WSNs Abstract?A Traffic Adaptive Multi-channel MAC Protocol with Dynamic Slot Allocation for WSNs. Using low duty-cycle is the most common technique to extend the system lifetime in WSNs. However, it also implies limited throughput and long delay and the penalty is even higher under…
A Trajectory Privacy-Preserving Framework for Participatory Sensing. The ubiquity of the various cheap embedded sensors on mobile devices, for example cameras, microphones, accelerometers, and so on, is enabling the emergence of participatory sensing applications. While participatory sensing can benefit the individuals and communities greatly, the collection and analysis of the participators’ location and trajectory data…
A Transformerless Grid-Connected Photovoltaic System Based on the Coupled Inductor Single-Stage Boost Three-Phase Inverter Abstract? A Transformerless Grid-Connected Photovoltaic System Based on the Coupled Inductor Single-Stage Boost Three-Phase Inverter. This letter presents a modulation technique for the modified coupled-inductor single-stage boost inverter (CL-SSBI)-based grid-connected photovoltaic (PV) system. This technique can reduce the system leakage current…
A Trigger Identification Service for Defending Reactive Jammers in WSN Abstract?A Trigger Identification Service for Defending Reactive Jammers in WSN. During the last decade, Reactive Jamming Attack has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. Considering…
A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks Abstract? A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks. In the harsh environment where node density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join…
A Trust Management System for Securing Data Plane of AdHoc Networks Abstract?The rapidly developing adhoc network technology has a wide range of applications, such as vehicular adhoc networks (VANETs), wireless sensor networks (WSNs), and emergency and military communications. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete…
A Two-Level FH-CDMA Scheme for Wireless Communication Systems over Fading Channels Abstract– A Two-Level FH-CDMA Scheme for Wireless Communication Systems over Fading Channels. In this paper, we propose a “two-level” frequency-hopping code-division multiple-access (FH-CDMA) scheme for wireless communication systems. The new scheme provides flexibility in the selection of modulation codes and FH patterns. By partitioning…
A Two-Level Topic Model Towards Knowledge Discovery from Citation Networks Abstract? A Two-Level Topic Model Towards Knowledge Discovery from Citation Networks. Knowledge discovery from scientific articles has received increasing attention recently since huge repositories are made available by the development of the Internet and digital databases. In a corpus of scientific articles such as a…