An Empirical Performance Evaluation of Relational Keyword Search Techniques Abstract? An Empirical Performance Evaluation of Relational Keyword Search Techniques. Extending the keyword search paradigm to relational data has been an active area of research within the database and IR community during the past decade. Many approaches have been proposed, but despite numerous publications, there remains…
An Empirical Study for PCA- and LDA-Based Feature Reduction for Gas Identification Abstract?Increasing the number of sensors in a gas identification system generally improves its performance as this will add extra features for analysis. However, this affects the com-putational complexity, especially if the identification algorithm is to be implemented on a hardware platform. < final…
An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks Abstract? As an important part of industrial application (IA), the wireless sensor network (WSN) has been an active research area over the past few years. Due to the limited energy and communication ability of sensor nodes, it seems especially important to design a…
An Energy-Ef?cient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks Abstract? Several studies have demonstrated the bene?ts of using a mobile sink to reduce the energy consumption of nodes and to prevent the formation of energy holes in wireless sensor networks (WSNs). However, these bene?ts are dependent on the path taken by the mobile sink,…
An Energy-Ef?cient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks Abstract? Several studies have demonstrated the bene?ts of using a mobile sink to reduce the energy consumption of nodes and to prevent the formation of energy holes in wireless sensor networks (WSNs). However, these bene?ts are dependent on the path taken by the mobile sink,…
An Energy-Efficient L2 Cache Architecture UsingWay Tag Information Under Write-Through Policy Abstract-An Energy-Efficient L2 Cache Architecture UsingWay Tag Information Under Write-Through Policy. Many high-performance microprocessors employ cache write-through policy for performance improvement and at the same time achieving good tolerance to soft errors in on-chip caches. However, write-through policy also incurs large energy overhead due…
An Enhanced Fuzzy Similarity Based Concept Mining Model for Text Classification Using Feature Clustering Abstract? An Enhanced Fuzzy Similarity Based Concept Mining Model for Text Classification Using Feature Clustering. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File…
An Enhanced K-Means and ANOVA-Based Clustering Approach for Similarity Aggregation in Underwater Wireless Sensor Networks Abstract? Underwater wireless sensor networks (UWSNs) have recently been proposed as a way to observe and explore aquatic environments. Sensors in such networks are used to perform pollution monitoring, disaster prevention, or assisted navigation and to send monitored data to…
An Enterprise Ontology-Based Approach to Service Specification Abstract? the Web Service Definition Language (WSDL) and Universal Description Discovery Integration (UDDI) standards arose as ad hoc standards for the definition of service interfaces and service registries. However, even together these standards do not provide enough basis for a service consumer to get a full understanding…
An equalised global graphical model-based approach for multi-camera object tracking Abstract? Multi-camera non-overlapping visual object tracking system typically consists of two tasks: single camera object tracking and inter-camera object tracking. Since the state-of-theart approaches are yet not perform perfectly in real scenes, the errors in single camera object tracking module would propagate into the module…
An evolutionary approach to complex schema matching Abstract? A special technique, called conditionally matching rules (CMRs), for the representation of transition functions of cellular automata (CA) and its application to the evolutionary design of complex multistate CA. < Final Year Projects > The problem of designing replicating loops in 2-D CA and the square…
An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs Abstract-How to achieve reliable routing has always been a major issue in the design of communication networks, among which mobile ad hoc networks (MANETs) possess the most adversarial networking environment due to the absence of fixed infrastructure, the nature of open transmission media and the…