Showing 49–60 of 1348 results

  • A High-Speed Low-Complexity Modified Radix-25 FFT Processor for Gigabit WPAN Applications

    0 out of 5
    4,500

    A High-Speed Low-Complexity Modified Radix-25 FFT Processor for Gigabit WPAN Applications Abstract?a novel modified radix-25 algorithm for 512-point fast Fourier transform (FFT) computation and high-speed eight-parallel data-path architecture for multi-gigabit wireless personal area network (WPAN) systems. The proposed FFT processor can provide a high data throughput and low hardware complexity by using eight-parallel data-path and…

  • A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

    0 out of 5
    4,500

    A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Abstract? A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud Environment

    0 out of 5
    4,500

    A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud Environment Abstract-HYBRID Bio-Inspired algorithm for task scheduling and resource management, since it plays an important role in the cloud computing environment. Conventional scheduling algorithms such as Round Robin, First Come First Serve, Ant Colony Optimization etc. have been widely used in many cloud computing…

  • A Hybrid Cloud Approach for Secure Authorized Deduplication

    0 out of 5
    5,500

    A Hybrid Cloud Approach for Secure Authorized Deduplication Abstract? Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent…

  • A Hybrid Cloud Approach for Secure Authorized Deduplication

    0 out of 5
    4,500

    A Hybrid Cloud Approach for Secure Authorized Deduplication Abstract? Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the con?dentiality of sensitive data while supporting deduplication, the convergent…

  • A Hybrid Intelligent System for Risk Assessment based on Unstructured Data

    0 out of 5
    4,500

    A Hybrid Intelligent System for Risk Assessment based on Unstructured Data Abstract– This paper presents a hybrid intelligent system (HIS) for risk assessment based on unstructured information. The generalised structure of a hybrid intelligent system ( H IS ) and its implementation in various information systems are described using a number of case studies. The…

  • A Joint Optimization of Operational Cost and Performance Interference in Cloud Data Centers

    0 out of 5
    4,500

    A Joint Optimization of Operational Cost and Performance Interference in Cloud Data Centers Abstract– Virtual machine (VM) scheduling is an important technique to efficiently operate the computing resources in a data center. Previous work has mainly focused on consolidating VMs to improve resource utilization and thus to optimize energy consumption. However, the interference between collocated…

  • A Joint Segmentation and Classification Framework for Sentence Level Sentiment Classification

    0 out of 5
    4,500

    A Joint Segmentation and Classification Framework for Sentence Level Sentiment Classification Abstract? A joint segmentation and classi?cation framework for sentence-level sentiment classi?cation. It is widely recognized that phrasal information is crucial< Final Year Projects 2016 > critical for sentiment classi?cation. However, existing sentiment classi?cation algorithms typically split a sentence as a word sequence, which does…

  • A Key-Policy Attribute-Based Temporary Keyword Search Scheme for Secure Cloud Storage

    0 out of 5
    4,500

    A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage Abstract-Temporary keyword search on con?dential data in a cloud environment is the main focus of this research. The cloud providers are not fully trusted. So, it is necessary to outsource data in the encrypted form. In the attribute-based keyword search (ABKS) schemes, the authorized…

  • A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks

    0 out of 5
    4,500

    A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks Abstract? A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks.Energy saving is an important issue in Mobile Ad Hoc Networks (MANETs). Recent studies show that network coding can help reduce the energy consumption in MANETs by using less transmissions. However, apart from transmission cost,…

  • A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks

    0 out of 5
    4,500

    A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks Abstract?A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks. Energy saving is an important issue in Mobile Ad Hoc Networks (MANETs). Recent studies show that network coding can help reduce the energy consumption in MANETs by using less transmissions. However, apart from transmission cost,…

  • A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

    0 out of 5
    5,500

    A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Abstract? The popularity of cloud computing, mobile devices can store/retrieve personal data from anywhere at any time. Consequently, the data security problem in mobile cloud becomes more and more severe and prevents further development of mobile cloud. There are substantial studies that have been conducted…

End of content

End of content