Showing 133–144 of 3682 results

  • A Highly Reliable and High Efficiency Quasi Single-Stage Buck-Boost Inverter

    A Highly Reliable and High Efficiency Quasi Single-Stage Buck-Boost Inverter

    0 out of 5
    4,500

    Civil Registry (Android App) Abstract– To regulate an output ac voltage in inverter systems having wide input dc voltage variation, a buck-boost power conditioning system is preferred. This paper proposes a novel high efficiency quasi single-stage single-phase buck-boost inverter. The proposed inverter can solve current shoot-through problem and eliminate PWM dead-time, which leads to greatly…

  • A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

    A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

    0 out of 5
    4,500

    A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Abstract? A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks

    A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks

    0 out of 5
    4,500

    A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks Abstract? Range-free localization approaches are cost-effective for mobile sensor networks (because no additional hardware support is required). However, existing range-free localization approaches for mobile sensor networks suffer from either sparse anchor node problem or high communication cost. Due to economic considerations, mobile sensor networks typically have sparse…

  • A Holistic Approach to Distributed Dimensionality Reduction of Big Data

    A Holistic Approach to Distributed Dimensionality Reduction of Big Data

    0 out of 5
    4,500

    A Holistic Approach to Distributed Dimensionality Reduction of Big Data Abstract? Advances in CMOS technology have made digital circuits and systems very sensitive to manufacturing variations, aging, and/or soft errors. Fault-tolerant techniques using hardware redundancy have been extensively investigated for improving reliability. Quadded logic (QL) is an interwoven redundant logic technique that corrects errors by…

  • A Hybrid Approach for Efficient Privacy-Preserving Authentication in VANET

    A Hybrid Approach for Efficient Privacy-Preserving Authentication in VANET

    0 out of 5
    4,500

    A Hybrid Approach for Efficient Privacy-Preserving Authentication in VANET Abstract– A vehicular ad hoc network (VANET) serves as an application of the intelligent transportation system that improves traffic safety as well as efficiency. Vehicles in a VANET broadcast traffic and safety-related information used by road safety applications, such as an emergency electronic brake light. The…

  • A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud Environment

    A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud Environment

    0 out of 5
    4,500

    A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud Environment Abstract-HYBRID Bio-Inspired algorithm for task scheduling and resource management, since it plays an important role in the cloud computing environment. Conventional scheduling algorithms such as Round Robin, First Come First Serve, Ant Colony Optimization etc. have been widely used in many cloud computing…

  • A Hybrid Cloud Approach for Secure Authorized Deduplication

    A Hybrid Cloud Approach for Secure Authorized Deduplication

    0 out of 5
    5,500

    A Hybrid Cloud Approach for Secure Authorized Deduplication Abstract? Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent…

  • A Hybrid Cloud Approach for Secure Authorized Deduplication

    A Hybrid Cloud Approach for Secure Authorized Deduplication

    0 out of 5
    4,500

    A Hybrid Cloud Approach for Secure Authorized Deduplication Abstract? Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the con?dentiality of sensitive data while supporting deduplication, the convergent…

  • A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION

    A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION

    0 out of 5
    4,500

    A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION   Abstract?A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION. Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality…

  • A Hybrid Image Compression Scheme using DCT and Fractal Image Compression

    A Hybrid Image Compression Scheme using DCT and Fractal Image Compression

    0 out of 5
    4,500

    A Hybrid Image Compression Scheme using DCT and Fractal Image Compression Abstract?A Hybrid Image Compression Scheme using DCT and Fractal Image Compression. We introduce a new way to use fractal coding for image compression, based on the parallel use of a fractal encoder and a DCT encoder. The two encoders are given the complementary roles…

  • A Hybrid Intelligent System for Risk Assessment based on Unstructured Data

    A Hybrid Intelligent System for Risk Assessment based on Unstructured Data

    0 out of 5
    4,500

    A Hybrid Intelligent System for Risk Assessment based on Unstructured Data Abstract– This paper presents a hybrid intelligent system (HIS) for risk assessment based on unstructured information. The generalised structure of a hybrid intelligent system ( H IS ) and its implementation in various information systems are described using a number of case studies. The…

  • A hybrid particle swarm optimization for feature subset selection byintegrating a novel local search strategy

    A hybrid particle swarm optimization for feature subset selection byintegrating a novel local search strategy

    0 out of 5
    5,500

    A hybrid particle swarm optimization for feature subset selection byintegrating a novel local search strategy Abstract?tFeature selection has been widely used in data mining and machine learning tasks to make a modelwith a small number of features which improves the classifier?s accuracy. In this paper, a novel hybridfeature selection algorithm based on particle swarm optimization…

End of content

End of content