click here FOR MORE SOFTWARE PROJECTS
|
2.Sales and Stock Maintenance FERTILIZERS & PESTICIDES Factory
A B S T R A C T
As the usage of the system increases the maintenance of the stock of the particular product through the books is the little bit of tough procedure. The preparation of the lezers for the sales amount is time consuming procedure and it need manpower to do the calculations and stock maintenance. Some times there is chance to lose the record books.
For Source code and Documentation VISIT HERE ....!
A B S T R A C T
As the usage of the system increases the maintenance of the stock of the particular product through the books is the little bit of tough procedure. The preparation of the lezers for the sales amount is time consuming procedure and it need manpower to do the calculations and stock maintenance. Some times there is chance to lose the record books.
For Source code and Documentation VISIT HERE ....!
3. Packet Loss Control Using TOKENS At The NETWORK EDGE
A B S T R A C T
Presently the Internet accommodates simultaneous audio, video, and data traffic. This requires the Internet to guarantee the packet loss which at its turn depends very much on congestion control. A series of protocols have been introduced to supplement the insufficient TCP (Transmission Control Protocol) mechanism controlling the network congestion.
For Source code and Documentation VISIT HERE ....!
A B S T R A C T
Presently the Internet accommodates simultaneous audio, video, and data traffic. This requires the Internet to guarantee the packet loss which at its turn depends very much on congestion control. A series of protocols have been introduced to supplement the insufficient TCP (Transmission Control Protocol) mechanism controlling the network congestion.
For Source code and Documentation VISIT HERE ....!
4. Secure and privacy enhancing communications schemes for VANETs
A B S T R A C T
Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party.
For Source code and Documentation VISIT HERE ....!
A B S T R A C T
Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party.
For Source code and Documentation VISIT HERE ....!
5. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
A B S T R A C T
A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority.
For Source code and Documentation VISIT HERE ....!
A B S T R A C T
A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority.
For Source code and Documentation VISIT HERE ....!
6. Cluster Validation Indexes for Spatio - Temporal Data
A B S T R A C T
One of fundamental challenges of clustering is how to evaluate results, without auxiliary information. A common approach for evaluation of clustering results is to use validity indexes. Clustering validity approaches can use three criteria: External criteria (evaluate the result with respect to a pre-specified structure), internal criteria (evaluate the result with respect a information intrinsic to the data alone)...
For Source code and Documentation VISIT HERE ...!
A B S T R A C T
One of fundamental challenges of clustering is how to evaluate results, without auxiliary information. A common approach for evaluation of clustering results is to use validity indexes. Clustering validity approaches can use three criteria: External criteria (evaluate the result with respect to a pre-specified structure), internal criteria (evaluate the result with respect a information intrinsic to the data alone)...
For Source code and Documentation VISIT HERE ...!
7. Risk-Aware Mitigation for MANET Routing Attacks
A B S T R A C T
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusions response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions.
For Source code and Documentation VISIT HERE ...!
A B S T R A C T
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusions response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions.
For Source code and Documentation VISIT HERE ...!
8. Multiple Routing Configurations for Fast IP Network Recovery
A B S T R A C T
As the Internet takes an increasingly central role in our communications infrastructure, the slow convergence of routing protocols after a network failure becomes a growing problem. To assure fast recovery from link and node failures in IP networks, we present a new recovery scheme called Multiple Routing Configurations (MRC).
For Source code and Documentation VISIT HERE ...!
A B S T R A C T
As the Internet takes an increasingly central role in our communications infrastructure, the slow convergence of routing protocols after a network failure becomes a growing problem. To assure fast recovery from link and node failures in IP networks, we present a new recovery scheme called Multiple Routing Configurations (MRC).
For Source code and Documentation VISIT HERE ...!
9. Always Acyclic Distributed Path Computation
A B S T R A C T
Distributed routing algorithms may give rise to transient loops during path re-computation, which can pose significant stability problems in high-speed networks. We present a new algorithm, Distributed Path Computation with Intermediate Variables (DIV), which can be combined with any distributed routing algorithm to guarantee that the directed graph induced by the routing decisions remains acyclic at all times. The key contribution of DIV, besides its ability to operate with any routing algorithm, is an update mechanism using simple message exchanges between neighboring nodes that guarantees loop-freedom at all times.
For Source code and Documentation VISIT HERE ....!
A B S T R A C T
Distributed routing algorithms may give rise to transient loops during path re-computation, which can pose significant stability problems in high-speed networks. We present a new algorithm, Distributed Path Computation with Intermediate Variables (DIV), which can be combined with any distributed routing algorithm to guarantee that the directed graph induced by the routing decisions remains acyclic at all times. The key contribution of DIV, besides its ability to operate with any routing algorithm, is an update mechanism using simple message exchanges between neighboring nodes that guarantees loop-freedom at all times.
For Source code and Documentation VISIT HERE ....!
10. Dynamic Channel Allocation for Wireless
Zone Based Multicast and Broadcast Service
A B S T R A C T
In wireless Multicast Broadcast Service (MBS), the common channel is used to multicast the MBS content to the Mobile Stations (MSs) on the MBS calls within the coverage area of a Base Station (BS), which causes interference to the dedicated channels serving the traditional calls, and degrades the system capacity. The MBS zone technology is proposed in Mobile Communications Network (MCN) standards to improve system capacity and reduce the handoff delay for the wireless MBS calls.
For Source code and Documentation VISIT HERE ....!
A B S T R A C T
In wireless Multicast Broadcast Service (MBS), the common channel is used to multicast the MBS content to the Mobile Stations (MSs) on the MBS calls within the coverage area of a Base Station (BS), which causes interference to the dedicated channels serving the traditional calls, and degrades the system capacity. The MBS zone technology is proposed in Mobile Communications Network (MCN) standards to improve system capacity and reduce the handoff delay for the wireless MBS calls.
For Source code and Documentation VISIT HERE ....!
For more Software Projects |