Network Projects
Authentication Using Captcha As Graphical Password
Security primitives are based on hard mathematical problems. Using hard AI problems for security is ..
Balanced Energy Consumption Based Adaptive Routing for IoT Enabling Underwater WSNs
Applications of Internet of Things underwater wireless sensor networks, such as imaging underwater ..
Balancing the Trade-Offs between Query Delay and Data Availability in MANETs
Mobile Ad hoc Network (MANET) consists of mobile nodes which is connected without any centralized ad..
Big Data Analytics in Mobile Cellular Networks
Mobile cellular networks have become both the generators and carriers of massive data. Big data anal..
Bio-Inspired Glucose Control in Diabetes Based on an Analogue Implementation of a -Cell Model
This circuit is an electronic realization of the original -cell model equations which is achieved wi..
Bloom Cast Efficient and Effective Full Text Retrieval in unstructured Peer to Peer Networks
• The objective of the paper is to retrieve full-text in efficient and effective manner in unstructu..
Body Node Coordinator Placement Algorithms for Wireless Body Area Networks
The technology of sensor, pervasive computing, and intelligent information processing is widely us..
Botnet Detection based on Anomaly and Community Detection-JAVA
A novel two-stage approach for the important cyber-security problem of detecting the presenc..
By Passing Infected Areas in Wireless Sensor Networks Using BPR
The hardware failure, software corruption and unfavorable operating environment among the diff..
Cartoon-Texture Image Decomposition Using Blockwise Low-Rank Texture Characterization
First, the input image is loaded and then the image is filtered. Gaussian filter is used for filteri..
Catching Packet Droppers and Modifiers in Wireless Sensor Networks
Packet dropping and modification are common attacks that can be launched by an adversary to disrupt ..
CEDAR A Low-Latency and Distributed Strategy for Packet Recovery in Wireless Networks
Underlying link-layer protocols of well-established wireless networks that use the conventional “sto..
CoCoWa A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes
An Ad-hoc network is a collection of mobile nodes dynamically forming a temporary network without th..
Cognitive Radio Aware Transport Protocol for Mobile Ad Hoc Networks
Cognitive radio technology allows the secondary user to access channel from the spectrum range witho..
Cognitive Self Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks
Vehicular ad hoc networks (VANETs) is a type of wireless networks which plays a key role in the inte..