Showing 3553–3564 of 3682 results

  • Two cooperative ant colonies for feature selection using fuzzy models

    Two cooperative ant colonies for feature selection using fuzzy models

    0 out of 5
    4,500

    Two cooperative ant colonies for feature selection using fuzzy models Abstract? The available set of potential features in real-world databases is sometimes very large,< Final Year Projects > and it can be necessary to find a small subset for classification purposes. One of the most important techniques in data pre-processing for classification is feature selection….

  • Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems

    Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems

    0 out of 5
    5,500

    Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems Abstract?Attribute-based encryption, especially for ciphertext-policy attribute-based encryption, can fulfill the functionality of fine-grained access control in cloud storage systems. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…

  • Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems

    Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems

    0 out of 5
    4,500

    Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems Abstract-Attribute-based encryption, especially for ciphertext-policy attribute-based encryption, can fulfill the functionality of fine-grained access control in cloud storage systems. Since users? attributes may be issued by multiple attribute authorities, multi-authority ciphertext-policy attributebased encryption is an emerging cryptographic primitive for enforcing attribute-based access control…

  • Two-Level QR Code for Private Message Sharing and Document Authentication

    Two-Level QR Code for Private Message Sharing and Document Authentication

    0 out of 5
    6,500

    Two-Level QR Code for Private Message Sharing and Document Authentication Abstract? The quick response (QR) code was designed for storage information and high-speed reading applications. We present a new rich QR code that has two storage levels and can be used for document authentication. This new rich QR code, named two-level QR code, has public…

  • Two-Way OFDM-Based Nonlinear Amplify-and-Forward Relay Systems

    Two-Way OFDM-Based Nonlinear Amplify-and-Forward Relay Systems

    0 out of 5
    5,500

    Two-Way OFDM-Based Nonlinear Amplify-and-Forward Relay Systems Abstract? We derive closed-form outage probability expressions for fixed-gain (FG) and variable-gain (VG) two-way amplify-and-forward (AF) relay networks subject to a nonlinear transmission at the relay. We then derive an explicit expression for the relay gain that optimizes the network?s performance. Finally, we show that, if the source nodes…

  • Two-Way Satellite Relaying With Estimated Channel Gains

    Two-Way Satellite Relaying With Estimated Channel Gains

    0 out of 5
    5,500

    Two-Way Satellite Relaying With Estimated Channel Gains Abstract? we consider the two-way relaying of the data of two earth stations (ESs) via satellite links. The satellite is considered to be of transparent type, which only receives the signals over the uplink and broadcasts these signals with some transponder gain over its downlink frequencies. The two-way…

  • Typicality-Based Collaborative Filtering Recommendation

    Typicality-Based Collaborative Filtering Recommendation

    0 out of 5
    4,500

    Typicality-Based Collaborative Filtering Recommendation Abstract? Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy, and big-error in predictions. We borrow ideas of object typicality from cognitive psychology and propose a novel typicality-based collaborative filtering recommendation method named TyCo. A…

  • U-Skyline: A New Skyline Query for Uncertain Databases

    U-Skyline: A New Skyline Query for Uncertain Databases

    0 out of 5
    4,500

    U-Skyline: A New Skyline Query for Uncertain Databases Abstract? U-Skyline: A New Skyline Query for Uncertain Databases.U-Skyline: A New Skyline Query for Uncertain Databases The skyline query, aiming at identifying a set of skyline tuples that are not dominated by any other tuple, is particularly useful for multicriteria data analysis and decision making. For uncertain…

  • Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services

    Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services

    0 out of 5
    4,500

    Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services Abstract?Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services.The rapid development of Internet of things (IoT) technology makes it possible for connecting various smart objects together through the Internet and providing more data interoperability methods for application purpose. Recent research…

  • ubiSOAP A Service Oriented Middleware for Ubiquitous Networking.

    ubiSOAP A Service Oriented Middleware for Ubiquitous Networking.

    0 out of 5
    4,500

    ubiSOAP A Service Oriented Middleware for Ubiquitous Networking. Abstract? The computing and networking capacities of today’s wireless portable devices allow for ubiquitous services, which are seamlessly networked. Indeed, wireless handheld devices now embed the necessary resources to act as both service clients and providers.< Final Year Projects > However, the ubiquitous networking of services remains…

  • Ultra-Low Power, Highly Reliable, and Nonvolatile Hybrid MTJ/CMOS Based Full-Adder for Future VLSI Design

    Ultra-Low Power, Highly Reliable, and Nonvolatile Hybrid MTJ/CMOS Based Full-Adder for Future VLSI Design

    0 out of 5
    4,500

    Ultra-Low Power, Highly Reliable, and Nonvolatile Hybrid MTJ/CMOS Based Full-Adder for Future VLSI Design Abstract– Very large-scale integrated circuit (VLSI) design, based on today?s CMOS technologies, are facing various challenges. Shrinking transistor dimensions, reduction in threshold voltage, and lowering power supply voltage, cause new concerns such as high leakage current, and increase in radiation sensitivity….

  • Ultrasound Image Denoising using a Combination of Bilateral Filtering and Stationary Wavelet

    Ultrasound Image Denoising using a Combination of Bilateral Filtering and Stationary Wavelet

    0 out of 5
    5,500

    Ultrasound Image Denoising using a Combination of Bilateral Filtering and Stationary Wavelet Transform Abstract?Abstract Medical image degradation has a significant impact on image quality, and thus affects human interpretation and the accuracy of computer-assisted diagnostic techniques.Unfortunately, Ultrasound images are mainly degraded by an intrinsic noise called speckle. Therefore, despekle filtering is a critical preprocessing step…

End of content

End of content