Search
Code Directory
 ASP
 ASP.NET
 C/C++
 CFML
 CGI/PERL
 Delphi
 Development
 Flash
 HTML
 Java
 JavaScript
 Pascal
 PHP
 Python
 SQL
 Tools
 Visual Basic & VB.NET
 XML
New Code
Rapid PHP 2018 15.5
IBDAC 6.4
Online Course Booking Script 1.3.3
Database Workbench Pro 5.6.4
Job Portal Script 1.3.2
The C# PDF Library 5.2
PostgreSQL Data Access Components 6.0
Virtual Data Access Components 11.0
HTMLPad 2018 15.5
WeBuilder 2018 15.5
SentiMask SDK Trial 2.0.0
Track Order For Magento 2 1.0.0
Calendar 365 For Dynamics CRM 4.0
Scimbo 1.2
Odoo Furnito Theme 1.0
Top Code
VisualNEO Web 2018.12.15
Azizi search engine script PHP 4.1.10
Paste phpSoftPro 1.4.1
Extreme Injector 3.7
Deals and Discounts Website Script 1.0.2
ADO.NET Provider for ExactTarget 1.0
Solid File System OS edition 5.1
Classified Ad Lister 1.0
Aglowsoft SQL Query Tools 8.2
Invoice Manager by PHPJabbers 3.0
ICPennyBid Penny Auction Script 4.0
PHP Review Script 1.0
ATN Resume Finder 2.0
ATN Site Builder 3.0
Availability Booking Calendar PHP 1.0
Top Search
Code To Add Url
Greedy Best First Search Algorithm
Code For Best First Search
Photo Add Comment Php
Dirty Word
Guestbooks Aspnetindex
Gallery Comment
Php Banner Traffic Tracking
Html Guestbook Codes
German Guestbook
Article Directory Script For Wordpress
Jforum Source Code
Videopad Video Editor
Opengl Video Editor
Project On Museum Management
Related Search
Intrusion Detection In Wireless Sensor Networks
Intrusion Detection On Wireless Sensor Networks
Intrusion Detection In Wireless Networks
Sending Adv In Wireless Sensor Networks
Data Fusion In Wireless Sensor Networks
Energy Efficiency In Wireless Sensor Networks
Distributed Algorithm In Wireless Sensor Networks
Top K Monitoring In Wireless Sensor Networks
Optimal Speed Control In Wireless Sensor Networks
Authendication In Wireless Sensor Networks
Intruder Detection In Wireless Sensor Network
Hop Distance In Wireless Sensor Networks
Detecting False Dat In Wireless Sensor Networks
Wireless Sensor Networks In Java
Wireless Sensor Networks In C
 Intrusion Detection In Wireless Sensor Networks 

Code 1-20 of 60   Pages: Go to  1  2  3  Next >>  page  






it is used for genetic algorithm implementation for scheduling in wireless sensor networks



A feedback-enhanced framework for routing in wireless sensor networks. Speeds up the process of implementing routing techniques. Enables piggybacking of routing information on data packets. Written for the Omnet++ simulator and the Mobility...



Logical Neighborhoods is a a high-level programming abstraction for wireless sensor networks that simplifies the development of fully distributed, embedded networked applications.



SENSIX is middleware that bridges wireless sensor networks and distributed object-oriented software such as CORBA.



Wireless sensor networks offer an entire new field open for research and development. These types of networks conceptually offer many exciting features including scalability, self-configuration, self-healing, multicast routing, and easy...



Recent advances in Micro Electro Mechanical Systems (MEMS) technology, wireless communications, and digital electronics have enabled the development of low cost, low power, multifunctional sensor nodes that are small in size and communicate...



Ad-hoc algorithm for copy-move forgery detection in images.
This algorithm is robust so it can detect copy-move forgery in lossy compression formats such as jpeg.
Because this algorithm is ad-hoc - it heavily depends on script...



SecurityFusion is an open source network intrusion detection and preventionsystem based in Hogwash, capable of performing real-time traffic analysis and packetlogging on IP networks.



Symwire is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in open c for symbian. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.



Framework to simplify developing applications that use wireless body sensor networks (bodynets). Manages sensor sampling, data buffering, local processing and communication. Supports embedded devices running TinyOS and any Java-capable gateway.



Simplistic implementation of the Paper 'A Simple and Robust Vertical Handoff algorithm for Heterogenous Wireless Mobile Networks' by Daojing He, Caixia Chi, Sammy Chan, Chun Chen, Jiajun Bu, Mingjian Yin.



This is a demo program of the paper L. Ma, J. Tian, and W. Yu, "Visual saliency detection in image using ant colony optimisation and local phase coherence," Electronics Letters, Vol. 46, Jul. 2010, pp. 1066-1068.



This function ObjectDetection is an implementation of the Detection in the Viola-Jones framework. In this framework Haar-like features are used for rapid object detection. It supports the trained classifiers in the XML files of OpenCV which can be...



oopbot is an IRC bot coded in PHP for use in standard IRC Networks.

It is modular constructed and object oriented programmed to assure efficient development and make it easy to fit most people needs.

oopbot should be right...



Provide visual tools to help user of NS (Network Simulate) in wireless network related studies. test, compare, statistics wireless network protocols (like TCP, IP,...); wireless nodes moving and data link visual scenario creator,enhanced graph...



Demo to perform very, very simple color detection in LAB color space. The RGB image is converted to LAB color space and then the user draws some freehand-drawn irregularly shaped region to identify a color. The Delta E (the color difference in LAB...



In wireless topology we using filters as main part of system, we proposed a flexible filter for multi-purposes working at ISM band frequency. Obviously the filter idea works by splitting the Band Pass Filter into two types H.P.F & L.P.F...



Generate button to send or voting in different social networks: Facebook, Twitter, Meneame and Bitacoras.com. Optionally you can display counters with the number of votes or times you have shared (according to the network). The buttons appear only...



CIDSS - Common Intrusion Detection Signatures Standard is our standard based on experiences due to tries of automatic translating signatures various companies. CIDSS is now the most extensible language that can describe network intrusions.



Simple data corruption testing utilities based on the concept of generating a stream of small self-contained records which can be decoded in a way which makes certain common data corruption modes in filesystems and networks automatically diagnosable.