SlideShare a Scribd company logo
1 of 36
SRWSN: Semantic Routing on Wireless Sensor Networks  HUMIDITY SRWSN TEMPERATURE SOUND PRESSURE LIGHT 1 Semantic Routing on Wireless Sensor Networks
Introduction ,[object Object]
 In a scenario where the network is expected to learn its environment, the algorithm has to be flexible.
 Wireless Sensor Networks.2 Semantic Routing on Wireless Sensor Networks
Context ,[object Object]
 The goal is to fulfill a request on a network without knowing its topology.3 SRWSN TEMPERATURE? I DO! Semantic Routing on Wireless Sensor Networks
Outline 4 Semantic Routing on Wireless Sensor Networks
Outline 5 Semantic Routing on Wireless Sensor Networks
Problem definition ,[object Object]
 All the metadata associated with a given message can be applied to a semantic reasoning engine in order to forward this data to the most appropriate receivers, over the most appropriate transmission media.
 A common ontology has to be defined.6 Semantic Routing on Wireless Sensor Networks
Problem definition ,[object Object]
Strong energy constraints
Communications are 10 times more energy consuming than an internal process.
New applications
Surveillance
Nodes have to act more collaboratively.   Using semantics to improve the process inside the network. 7 Semantic Routing on Wireless Sensor Networks
Outline 8 Semantic Routing on Wireless Sensor Networks
Scenario ,[object Object],9 Semantic Routing on Wireless Sensor Networks
Specifications ,[object Object],10 Semantic Routing on Wireless Sensor Networks
11 Semantic Routing on Wireless Sensor Networks Msg Type Query Type Query Id SrcID SrcMAC DstMAC Options Specifications ,[object Object]
MsgType : DISCOVERY, NORMAL STATE, ALERT
QueryType : REQUEST or ANSWER
QueryId: TEMP_VAL, TEMP_ERR, etc...
SrcID :  id of the query source
SrcMAC :  source MAC address (of the neighbor sender)
DstMAC :  destination MAC address (of the neighbor receiver)
Options :
BLOOM FILTER			 DISCOVERY
VALUE
ERROR
ALERT_GEN
ALERT_TIMESTAMP
HOP_COUNTNORMAL STATE 	ALERT
Specifications ,[object Object]
Distinctly identify a node according to its direction and  distance from the sink.

More Related Content

What's hot

Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksIEEEFINALYEARPROJECTS
 
Vasserman-TMC13-slide
Vasserman-TMC13-slideVasserman-TMC13-slide
Vasserman-TMC13-slidemanoj kumar s
 
مسیریابی در شبکه حسگر بی سیم
مسیریابی در شبکه حسگر بی سیممسیریابی در شبکه حسگر بی سیم
مسیریابی در شبکه حسگر بی سیمali ahmadi
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...IEEEGLOBALSOFTTECHNOLOGIES
 
top-k query result completeness verification in tiered sensor networks
top-k query result completeness verification in tiered sensor networkstop-k query result completeness verification in tiered sensor networks
top-k query result completeness verification in tiered sensor networksswathi78
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...IEEEGLOBALSOFTTECHNOLOGIES
 
JPJ1431 top-k Query Result Completeness Verification
JPJ1431   top-k Query Result Completeness VerificationJPJ1431   top-k Query Result Completeness Verification
JPJ1431 top-k Query Result Completeness Verificationchennaijp
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411IJRAT
 
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS  Improving spectrum efficiency via in netwo...IEEE 2014 NS2 NETWORKING PROJECTS  Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...IEEEBEBTECHSTUDENTPROJECTS
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Baddam Akhil Reddy
 
On the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksOn the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksJPINFOTECH JAYAPRAKASH
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...theijes
 

What's hot (18)

Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
Vasserman-TMC13-slide
Vasserman-TMC13-slideVasserman-TMC13-slide
Vasserman-TMC13-slide
 
مسیریابی در شبکه حسگر بی سیم
مسیریابی در شبکه حسگر بی سیممسیریابی در شبکه حسگر بی سیم
مسیریابی در شبکه حسگر بی سیم
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
 
top-k query result completeness verification in tiered sensor networks
top-k query result completeness verification in tiered sensor networkstop-k query result completeness verification in tiered sensor networks
top-k query result completeness verification in tiered sensor networks
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
JPJ1431 top-k Query Result Completeness Verification
JPJ1431   top-k Query Result Completeness VerificationJPJ1431   top-k Query Result Completeness Verification
JPJ1431 top-k Query Result Completeness Verification
 
Vampire attacks
Vampire attacksVampire attacks
Vampire attacks
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411
 
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS  Improving spectrum efficiency via in netwo...IEEE 2014 NS2 NETWORKING PROJECTS  Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
 
On the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksOn the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networks
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
 

Viewers also liked

Development pro forma by james horbury 3-2-2-3-2-5
Development pro forma by james horbury 3-2-2-3-2-5Development pro forma by james horbury 3-2-2-3-2-5
Development pro forma by james horbury 3-2-2-3-2-5james horbury
 
lateefah lewis 2016 resume
lateefah lewis 2016 resumelateefah lewis 2016 resume
lateefah lewis 2016 resumelateefah lewis
 
Presentación 3,2,1 cristina utrilla
Presentación 3,2,1 cristina utrillaPresentación 3,2,1 cristina utrilla
Presentación 3,2,1 cristina utrillaCRISUTRILLA11
 
Why Retailers must master Digital
Why Retailers must master DigitalWhy Retailers must master Digital
Why Retailers must master DigitalMario Coletti
 
Evaluation kids book
Evaluation kids book Evaluation kids book
Evaluation kids book james horbury
 
Citroen CA establet fayolle-fernando-forlini-garreau
Citroen CA establet fayolle-fernando-forlini-garreauCitroen CA establet fayolle-fernando-forlini-garreau
Citroen CA establet fayolle-fernando-forlini-garreauRémi Fayolle
 
Direccion y Administracion del personal
Direccion y Administracion del personalDireccion y Administracion del personal
Direccion y Administracion del personalMica Sequeira
 
Le petit larousse illustre 2013 pdf telecharger
Le petit larousse illustre 2013 pdf telechargerLe petit larousse illustre 2013 pdf telecharger
Le petit larousse illustre 2013 pdf telechargerhussainkavana6990
 
Plus de détails sur mon experience.
Plus de détails sur mon experience.Plus de détails sur mon experience.
Plus de détails sur mon experience.Anissa15
 
Controls_for_Remote_Microgrids_with_High_Penetration_Renewable_Generation___P...
Controls_for_Remote_Microgrids_with_High_Penetration_Renewable_Generation___P...Controls_for_Remote_Microgrids_with_High_Penetration_Renewable_Generation___P...
Controls_for_Remote_Microgrids_with_High_Penetration_Renewable_Generation___P...Pieter de Koning, PEng, MBA
 
ENSEIRB - Stage 3A @IIT Chicago
ENSEIRB - Stage 3A @IIT ChicagoENSEIRB - Stage 3A @IIT Chicago
ENSEIRB - Stage 3A @IIT ChicagoArnaud Lempereur
 
HEC Super Case - Dacia Présentation
HEC Super Case - Dacia PrésentationHEC Super Case - Dacia Présentation
HEC Super Case - Dacia PrésentationArnaud Lempereur
 
Contrastive A & Language Transfer
Contrastive A & Language TransferContrastive A & Language Transfer
Contrastive A & Language Transferpattyulanova
 

Viewers also liked (14)

Development pro forma by james horbury 3-2-2-3-2-5
Development pro forma by james horbury 3-2-2-3-2-5Development pro forma by james horbury 3-2-2-3-2-5
Development pro forma by james horbury 3-2-2-3-2-5
 
lateefah lewis 2016 resume
lateefah lewis 2016 resumelateefah lewis 2016 resume
lateefah lewis 2016 resume
 
Presentación 3,2,1 cristina utrilla
Presentación 3,2,1 cristina utrillaPresentación 3,2,1 cristina utrilla
Presentación 3,2,1 cristina utrilla
 
Why Retailers must master Digital
Why Retailers must master DigitalWhy Retailers must master Digital
Why Retailers must master Digital
 
Evaluation kids book
Evaluation kids book Evaluation kids book
Evaluation kids book
 
Crunadellago
CrunadellagoCrunadellago
Crunadellago
 
Citroen CA establet fayolle-fernando-forlini-garreau
Citroen CA establet fayolle-fernando-forlini-garreauCitroen CA establet fayolle-fernando-forlini-garreau
Citroen CA establet fayolle-fernando-forlini-garreau
 
Direccion y Administracion del personal
Direccion y Administracion del personalDireccion y Administracion del personal
Direccion y Administracion del personal
 
Le petit larousse illustre 2013 pdf telecharger
Le petit larousse illustre 2013 pdf telechargerLe petit larousse illustre 2013 pdf telecharger
Le petit larousse illustre 2013 pdf telecharger
 
Plus de détails sur mon experience.
Plus de détails sur mon experience.Plus de détails sur mon experience.
Plus de détails sur mon experience.
 
Controls_for_Remote_Microgrids_with_High_Penetration_Renewable_Generation___P...
Controls_for_Remote_Microgrids_with_High_Penetration_Renewable_Generation___P...Controls_for_Remote_Microgrids_with_High_Penetration_Renewable_Generation___P...
Controls_for_Remote_Microgrids_with_High_Penetration_Renewable_Generation___P...
 
ENSEIRB - Stage 3A @IIT Chicago
ENSEIRB - Stage 3A @IIT ChicagoENSEIRB - Stage 3A @IIT Chicago
ENSEIRB - Stage 3A @IIT Chicago
 
HEC Super Case - Dacia Présentation
HEC Super Case - Dacia PrésentationHEC Super Case - Dacia Présentation
HEC Super Case - Dacia Présentation
 
Contrastive A & Language Transfer
Contrastive A & Language TransferContrastive A & Language Transfer
Contrastive A & Language Transfer
 

Similar to ENSEIRB - Advanced Project

Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Software defined network
Software defined networkSoftware defined network
Software defined networkBogamoga1
 
Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-bas...
Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-bas...Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-bas...
Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-bas...Lionel Briand
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Online opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningOnline opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningHarshal Solao
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxRamprakashSingaravel1
 
Stat of the art in cognitive radio
Stat of the art in cognitive radioStat of the art in cognitive radio
Stat of the art in cognitive radioMohsen Tantawy
 
Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012Muhammad Farhan
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...ESUG
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
 
Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007
Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007
Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007Kalman Graffi
 

Similar to ENSEIRB - Advanced Project (20)

Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
Software defined network
Software defined networkSoftware defined network
Software defined network
 
Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-bas...
Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-bas...Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-bas...
Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-bas...
 
Sensor net
Sensor netSensor net
Sensor net
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Online opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningOnline opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learning
 
Routing
RoutingRouting
Routing
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
 
Stat of the art in cognitive radio
Stat of the art in cognitive radioStat of the art in cognitive radio
Stat of the art in cognitive radio
 
Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
 
Java project 2013
Java project 2013Java project 2013
Java project 2013
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
Wsn
WsnWsn
Wsn
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
 
Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007
Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007
Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

ENSEIRB - Advanced Project