Showing 325–336 of 2259 results

  • An Efficient Multi-Modal Biometric Person Authentication System Using Fuzzy Logic

    An Efficient Multi-Modal Biometric Person Authentication System Using Fuzzy Logic

    0 out of 5
    4,500

    An Efficient Multi-Modal Biometric Person Authentication System Using Fuzzy Logic Abstract?An Efficient Multi-Modal Biometric Person Authentication System Using Fuzzy Logic. This paper proposes a system obtained through decision level fusion of two well known biometric sensors to identify a person namely, Fingerprint sensor and Voice sensor. More than one sensor is needed for critical or…

  • An Efficient Multicore based Parallel Computing Approach for TSP Problems

    An Efficient Multicore based Parallel Computing Approach for TSP Problems

    0 out of 5
    4,500

    An Efficient Multicore based Parallel Computing Approach for TSP Problems Abstract? TSP (Travelling Salesman Problem) is a typical problem in the scientific and business computing applications such as social network analysis, VLSI chip design, etc. However TSP is regarded as not only a combinatorial optimization problem but also a typical NP-hard problem, and becomes an…

  • An efficient Multiple Object Detection and tracking framework for automatic counting  and video surveillance application

    An efficient Multiple Object Detection and tracking framework for automatic counting and video surveillance application

    0 out of 5
    4,500

    An efficient Multiple Object Detection and tracking framework for automatic counting and video surveillance application   Abstract?Automatic visual object counting and video surveillance have important applications for home and business environments, such as security and management of access points. However, in order to obtain a satisfactory performance these technologies need professional and expensive hardware, complex…

  • An Efficient Privacy-Preserving Ranked Keyword Search Method

    An Efficient Privacy-Preserving Ranked Keyword Search Method

    0 out of 5
    4,500

    An Efficient Privacy-Preserving Ranked Keyword Search Method Abstract?Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop ef?cient and reliable ciphertext search techniques. One challenge is that the relationship between documents will be normally concealed in the process of encryption, which will…

  • An Efficient Ranked Multi-Keyword Search for Multiple Data Owners over Encrypted Cloud Data

    An Efficient Ranked Multi-Keyword Search for Multiple Data Owners over Encrypted Cloud Data

    0 out of 5
    4,500

    An Efficient Ranked Multi-Keyword Search for Multiple Data Owners over Encrypted Cloud Data Abstract-With the development of cloud storage, more data owners are inclined to outsource their data to cloud services. For privacy concerns, sensitive data should be encrypted before outsourcing. There are various searchable encryption schemes to ensure data availability. However, the existing search…

  • An Efficient Single and Double Adjacent Error Correcting Parallel Decoder for Extended Golay Code

    An Efficient Single and Double Adjacent Error Correcting Parallel Decoder for Extended Golay Code

    0 out of 5
    5,500

    An Efficient Single and Double Adjacent Error Correcting Parallel Decoder for Extended Golay Code Abstract?Memories that operate in harsh environments, like for example space, suffer a significant number of errors. The error correction codes (ECCs) are routinely used to ensure that those errors do not cause data corruption. However, ECCs introduce overheads both in terms…

  • An Efficient SVD Based Method for Image Denoising

    An Efficient SVD Based Method for Image Denoising

    0 out of 5

    An Efficient SVD Based Method for Image Denoising Abstract?Nonlocal self-similarity of images has attracted considerable interest in the field of image processing and has led to several state-of-the-art image denoising algorithms, such as block matching and 3-D, principal component analysis with local pixel grouping, patch-based locally optimal wiener, and spatially adaptive iterative singular-value thresholding. <...

  • An Efficient SVD-Based Method for Image Denoising

    An Efficient SVD-Based Method for Image Denoising

    0 out of 5
    4,500

    An Efficient SVD-Based Method for Image Denoising Abstract? Nonlocal self-similarity of images has attracted considerable interest in the ?eld of image processing and led to several state-of-the-art image denoising algorithms, such as BM3D, LPG-PCA, PLOWand SAIST. In this paper, we propose a computationally simple denoising algorithm by using the nonlocal self-similarity and the low-rank approximation….

  • An efficient tree-based algorithm for mining sequential patterns with multiple

    An efficient tree-based algorithm for mining sequential patterns with multiple

    0 out of 5
    4,500

    An efficient tree-based algorithm for mining sequential patterns with multiple Abstract? Mining frequent sequences is a step in the sequential patterns discovering, and sequential patterns mining is an important area of research in the field of data mining. If we use the traditional algorithms such as Apriori or GSP algorithm to discover the sequential patterns…

  • An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation

    An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation

    0 out of 5
    4,500

    An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation Abstract-To achieve the goal of secure communication,cryptography is an essential operation. Many applications, including health-monitoring and biometric data based recognition system, need short-term data security. To design short-term security based applications, there is an essential need of high-performance, low cost and area-efficient VLSI…

  • An Efficient VLSI Architecture of a Reconfigurable Pulse-Shaping FIR Interpolation Filter for Multistandard DUC

    An Efficient VLSI Architecture of a Reconfigurable Pulse-Shaping FIR Interpolation Filter for Multistandard DUC

    0 out of 5
    4,500

    An Efficient VLSI Architecture of a Reconfigurable Pulse-Shaping FIR Interpolation Filter for Multistandard DUC Abstract? An Efficient VLSI Architecture of a Reconfigurable Pulse-Shaping FIR Interpolation Filter for Multistandard DUC. A two-step optimization technique for designing a recon?gurable VLSI architecture of an interpolation ?lter for multistandard digital up converter (DUC) to reduce the power and area…

  • An Embedded Real-Time Finger-Vein Recognition System for Mobile Devices

    An Embedded Real-Time Finger-Vein Recognition System for Mobile Devices

    0 out of 5
    3,500

    An Embedded Real-Time Finger-Vein Recognition System for Mobile Devices Abstract?The development of consumer electronics, the demand for simple, convenient, and high-security authentication systems for protecting private information stored in mobile devices has steadily increased. In consideration of emerging requirements for information protection, biometrics, which uses human physiological or behavioral features for personal identification, has been…

End of content

End of content