Search
Code Directory
 ASP
 ASP.NET
 C/C++
 CFML
 CGI/PERL
 Delphi
 Development
 Flash
 HTML
 Java
 JavaScript
 Pascal
 PHP
 Python
 SQL
 Tools
 Visual Basic & VB.NET
 XML
New Code
.Net VCL for Delphi 1.0.0.0
ASP. NET C# PDF Software 4.5
LinqConnect Professional 4.8
CAD VCL: 2D/3D CAD in Delphi/C++Builder 14
wolfSSL 3.15.7
CAD DLL 14
AnyStock Stock and Financial JS Charts 8.4.2
ODBC Driver for SQLite 2.4
dotConnect for SugarCRM 1.7
dbForge SQL Complete 5.9
dbForge Studio for MySQL 8.0
.Net Runtime Library for Delphi 6.0.4.0
Scimbo 1.64
AnyMap JS Maps 8.4.2
GetOrgChart 2.5.3
Top Code
Paste phpSoftPro 1.4.1
Deals and Discounts Website Script 1.0.2
ADO.NET Provider for ExactTarget 1.0
Solid File System OS edition 5.1
Classified Ad Lister 1.0
Aglowsoft SQL Query Tools 8.2
ICPennyBid Penny Auction Script 4.0
PHP Review Script 1.0
ATN Resume Finder 2.0
ATN Site Builder 3.0
Availability Booking Calendar PHP 1.0
PHP GZ Blog Script 1.1
ATN Jobs Software 4.0
ATN Mall 2.0
WeBuilder 2015 13.3
Top Search
Code To Add Url
Photo Add Comment Php
Dirty Word
Guestbooks Aspnetindex
Twitter Update Script Php
Simple Html Code For Creating College Website
Point Of Sale Visual Studio
Gallery Comment
Gallery Comments
Photo Gallery Comment Php
Online Art Gallery Project Documentation
Guestbook Cindex
Energy Billing System Code In Java
Project In Html For Bus Reservation System
Mini Project In Operating System Concepts
Related Search
Intrusion Detection In Wireless Sensor Networks
Intrusion Detection On Wireless Sensor Networks
Intrusion Detection In Wireless Networks
Sending Adv In Wireless Sensor Networks
Data Fusion In Wireless Sensor Networks
Energy Efficiency In Wireless Sensor Networks
Distributed Algorithm In Wireless Sensor Networks
Top K Monitoring In Wireless Sensor Networks
Optimal Speed Control In Wireless Sensor Networks
Authendication In Wireless Sensor Networks
Intruder Detection In Wireless Sensor Network
Hop Distance In Wireless Sensor Networks
Detecting False Dat In Wireless Sensor Networks
Wireless Sensor Networks In Java
Wireless Sensor Networks In C
 Intrusion Detection In Wireless Sensor Networks 

Code 1-20 of 60   Pages: Go to  1  2  3  Next >>  page  






it is used for genetic algorithm implementation for scheduling in wireless sensor networks



A feedback-enhanced framework for routing in wireless sensor networks. Speeds up the process of implementing routing techniques. Enables piggybacking of routing information on data packets. Written for the Omnet++ simulator and the Mobility...



Logical Neighborhoods is a a high-level programming abstraction for wireless sensor networks that simplifies the development of fully distributed, embedded networked applications.



SENSIX is middleware that bridges wireless sensor networks and distributed object-oriented software such as CORBA.



Wireless sensor networks offer an entire new field open for research and development. These types of networks conceptually offer many exciting features including scalability, self-configuration, self-healing, multicast routing, and easy...



Recent advances in Micro Electro Mechanical Systems (MEMS) technology, wireless communications, and digital electronics have enabled the development of low cost, low power, multifunctional sensor nodes that are small in size and communicate...



Ad-hoc algorithm for copy-move forgery detection in images.
This algorithm is robust so it can detect copy-move forgery in lossy compression formats such as jpeg.
Because this algorithm is ad-hoc - it heavily depends on script...



SecurityFusion is an open source network intrusion detection and preventionsystem based in Hogwash, capable of performing real-time traffic analysis and packetlogging on IP networks.



Symwire is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in open c for symbian. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.



Framework to simplify developing applications that use wireless body sensor networks (bodynets). Manages sensor sampling, data buffering, local processing and communication. Supports embedded devices running TinyOS and any Java-capable gateway.



Simplistic implementation of the Paper 'A Simple and Robust Vertical Handoff algorithm for Heterogenous Wireless Mobile Networks' by Daojing He, Caixia Chi, Sammy Chan, Chun Chen, Jiajun Bu, Mingjian Yin.



This is a demo program of the paper L. Ma, J. Tian, and W. Yu, "Visual saliency detection in image using ant colony optimisation and local phase coherence," Electronics Letters, Vol. 46, Jul. 2010, pp. 1066-1068.



This function ObjectDetection is an implementation of the Detection in the Viola-Jones framework. In this framework Haar-like features are used for rapid object detection. It supports the trained classifiers in the XML files of OpenCV which can be...



oopbot is an IRC bot coded in PHP for use in standard IRC Networks.

It is modular constructed and object oriented programmed to assure efficient development and make it easy to fit most people needs.

oopbot should be right...



Provide visual tools to help user of NS (Network Simulate) in wireless network related studies. test, compare, statistics wireless network protocols (like TCP, IP,...); wireless nodes moving and data link visual scenario creator,enhanced graph...



Demo to perform very, very simple color detection in LAB color space. The RGB image is converted to LAB color space and then the user draws some freehand-drawn irregularly shaped region to identify a color. The Delta E (the color difference in LAB...



In wireless topology we using filters as main part of system, we proposed a flexible filter for multi-purposes working at ISM band frequency. Obviously the filter idea works by splitting the Band Pass Filter into two types H.P.F & L.P.F...



Generate button to send or voting in different social networks: Facebook, Twitter, Meneame and Bitacoras.com. Optionally you can display counters with the number of votes or times you have shared (according to the network). The buttons appear only...



CIDSS - Common Intrusion Detection Signatures Standard is our standard based on experiences due to tries of automatic translating signatures various companies. CIDSS is now the most extensible language that can describe network intrusions.



Simple data corruption testing utilities based on the concept of generating a stream of small self-contained records which can be decoded in a way which makes certain common data corruption modes in filesystems and networks automatically diagnosable.