A High-Throughput VLSI Architecture for Hard and Soft SC-FDMA MIMO Detectors Abstract? A novel low-complexity multiple-input multiple-output (MIMO) detector tailored for single-carrier frequency division-multiple access (SC-FDMA) systems, suitable for ef?cient hardware implementations. The proposed detector starts with an initial estimate of the transmitted signal based on a minimum mean square error < Final Year Projects...
A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks Abstract? Range-free localization approaches are cost-effective for mobile sensor networks (because no additional hardware support is required). However, existing range-free localization approaches for mobile sensor networks suffer from either sparse anchor node problem or high communication cost. Due to economic considerations, mobile sensor networks typically have sparse…
A Holistic Approach to Distributed Dimensionality Reduction of Big Data Abstract? Advances in CMOS technology have made digital circuits and systems very sensitive to manufacturing variations, aging, and/or soft errors. Fault-tolerant techniques using hardware redundancy have been extensively investigated for improving reliability. Quadded logic (QL) is an interwoven redundant logic technique that corrects errors by…
A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION Abstract?A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION. Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of…
A Hybrid Cloud Approach for Secure Authorized Deduplication Abstract? Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the con?dentiality of sensitive data while supporting deduplication, the convergent…
A Hybrid Image Compression Scheme using DCT and Fractal Image Compression Abstract?A Hybrid Image Compression Scheme using DCT and Fractal Image Compression. We introduce a new way to use fractal coding for image compression, based on the parallel use of a fractal encoder and a DCT encoder. The two encoders are given the complementary roles…
A Hybrid Wavelet Transform and Neural- Network-Based Approach for Modelling Dynamic Voltage-Current Characteristics of Electric Arc Furnace Abstract? A Hybrid Wavelet Transform and Neural- Network-Based Approach for Modelling Dynamic Voltage-Current Characteristics of Electric Arc Furnace. This paper proposes a discrete wavelet transform (DWT) and radial basis function neural network (RBFNN) based method for modeling the…
A Hyper-Heuristic Scheduling Algorithm for Cloud Abstract?A Hyper-Heuristic Scheduling Algorithm for Cloud. Rule-based scheduling algorithms have been widely used on many cloud computing systems because they are simple and easy to implement. However, there is plenty of room to improve the performance of these algorithms, especially by using heuristic scheduling. As such, this paper presents…
A Joint Segmentation and Classification Framework for Sentence Level Sentiment Classification Abstract? A joint segmentation and classi?cation framework for sentence-level sentiment classi?cation. It is widely recognized that phrasal information is crucial< Final Year Projects 2016 > critical for sentiment classi?cation. However, existing sentiment classi?cation algorithms typically split a sentence as a word sequence, which does…
A Kernel Clustering Algorithm With Fuzzy Factor: Application to SAR Image Segmentation Abstract?A Kernel Clustering Algorithm With Fuzzy Factor: Application to SAR Image Segmentation. The presence of multiplicative noise in synthetic aperture radar (SAR) images makes segmentation and classification difficult to handle. Although a fuzzy C-means (FCM) algorithm and its variants (e.g., the FCM_S, the…
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage Abstract-Temporary keyword search on con?dential data in a cloud environment is the main focus of this research. The cloud providers are not fully trusted. So, it is necessary to outsource data in the encrypted form. In the attribute-based keyword search (ABKS) schemes, the authorized…