An Efficient On-Chip Switched-Capacitor-Based Power Converter for a Microscale Energy Transducer Abstract? An efficient on-chip inductorless switching power converter for solar energy harvesting is presented. The new energy-efficient switching power converter improves the charge transfer capability as well as charge sharing time from the harvester to the load. We also present an analytical model to…
An Efficient Parallel Method for Mining Frequent Closed Sequential Patterns Abstract-Mining frequent closed sequential pattern (FCSPs) has attracted a great deal of research attention, because it is an important task in sequences mining. In recently, many studies have focused on mining frequent closed sequential patterns because, such patterns have proved to be more efficient and…
An Efficient Privacy-Preserving Ranked Keyword Search Method Abstract?Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and reliable ciphertext search techniques. One challenge is that the relationship between documents will be normally concealed in the process of encryption, which will…
An Efficient QoS Suppor t for Ubiquitous Networks Abstract-A ubiquitous application needs quality of service (QoS) guarantee to provide the required services to its users efficiently without any user intervention or requests. The ubiquitous applications demand QoS as per the current? environment context. Providing QoS in a ubiquitous network is a challenging task as the…
An Efficient Reverse Converter for the Three-Moduli Set ( 2 n +1 ? 1 , 2 n, 2n ? 1) Abstract– The well-known three moduli set (2 n + 1 , 2 n, 2 n ?1), where n is a positive integer, has received a considerable attention over the last three decades. Many researchers have…
An Encryption Scheme Based on Synchronization of Two-Layered Complex Dynamical Networks Abstract?Compared with a single chaotic system, a network of chaotic systems possesses complex dynamic characteristics, which can be used in encryption to enhance security. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow…
An Energy Efficient Cross-Layer Network Operation Model for IEEE 802.15.4-Based Mobile Wireless Sensor Networks Abstract-IEEE 802.15.4 mobile wireless sensor networks (MWSNs) have been investigated in literature. One major finding is that these networks suffer from control packet overhead and delivery ratio degradation. This increases the network?s energy consumption. This paper introduces a cross-layer operation model…
An Energy-Efficient Reliable Data Transmission Scheme for Complex Environmental Monitoring in Underwater Acoustic Sensor Networks Abstract? As an extension of wireless sensor network in underwater environment, underwater acoustic sensor networks (UASNs) have caused widespread concern of academia. In UASNs, the efficiency and reliability of data transmission are very challenging due to the complex underwater environment…
An equalized global graph model-based approach for multi-camera object tracking Abstract? Non-overlapping multi-camera visual object tracking typically consists of two steps: single camera object tracking and inter-camera object tracking. Most of tracking methods focus on single camera object tracking, which happens in the same scene, while for real surveillance scenes, inter-camera object tracking is needed…
An Implementation Of Intrusion Detection System Using Genetic Algorithm Abstract? Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. So Intrusion Detection Systems have…
An Improved Sentiment Analysis Of Online Movie Reviews Based On Clustering For Box-Office Prediction Abstract?Abstract With the rapid development of E-commerce, more online reviews for products and services are created, which form an important source of information for both sellers and customers. Research on sentiment and opinion mining for online review analysis has attracted increasingly…
An Incentive-Compatible Mechanism for Transmission Scheduling of Delay-Sensitive Medical Packets in E-Health Networks Abstract? An incentive-compatible mechanism for transmission scheduling in electronic health (e-health) networks with delay-sensitive medical packets. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…