Showing 1825–1836 of 1968 results

  • The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks

    0 out of 5
    4,500

    The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks Abstract? The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks. The problem of user cost minimization in mobile cloud computing (MCC) networks. We consider a MCC model where multiple brokers assign cloud resources to mobile users. The model…

  • Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver

    0 out of 5
    4,500

    Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver Abstract? Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver. The increasing number of mobile devices and the demand for large throughput requiring applications has hampered access to the limited frequency spectrum. The goal of this…

  • Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers

    0 out of 5
    4,500

    Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers Abstract?Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers. Decreasing the soaring energy cost is imperative < Final Year Projects > in large data centers. Meanwhile, limited computational resources need to be fairly allocated among different organizations. Latency is another major concern for resource…

  • Three Dimensional Data-Driven Multi Scale Atomic Representation of Optical Coherence Tomography

    0 out of 5
    4,500

    Three Dimensional Data-Driven MultiScale Atomic Representation of Optical Coherence Tomography Abstract? Three Dimensional Data-Driven Multi Scale Atomic Representation of Optical Coherence Tomography. We discuss about applications of different methods for decomposing a signal over elementary wave forms chosen in a family called a dictionary atomic representations< Final Year Projects 2016 > in optical coherence tomography…

  • Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication

    0 out of 5
    4,500

    Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication Abstract? Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication. Brain-inspired circuits can provide an alternative solution to implement computing architectures taking advantage of fault tolerance and generalization ability of logic gates. In this brief, we advance over the memristive…

  • Thrift Society Automation

    0 out of 5
    4,500

    Thrift Society Automation Abstract? Thrift Society Automation. The payroll information presented below is an overview of the College payroll system. The Payroll Office is responsible for all pay-related functions which include biweekly and monthly payroll for all College student and staff employees. Applying federal and state payroll laws and regulations, Payroll strives to process timely…

  • Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    0 out of 5
    4,500

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Abstract? Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing. Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users IMUs < Final Year Projects 2016 > adjust their malicious behaviors according to their objectives and the network?s defense schemes….

  • Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    0 out of 5
    4,500

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Abstract? Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing. Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users IMUs < Final Year Projects 2016 > adjust their malicious behaviors according to their objectives and the network?s defense schemes….

  • Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison

    0 out of 5
    4,500

    Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison Abstract?Hardware implementation of cryptographic algorithms is subject to various attacks. It has been previously demonstrated that scan chains introduced for hardware testability open a back door to potential attacks. < Final Year Projects > Here, we propose a scan-protection scheme that provides testing facilities both at production…

  • Time Series Shapelets: A New Primitive for Data Mining

    0 out of 5
    4,500

    Time Series Shapelets: A New Primitive for Data Mining Abstract? Time Series Shapelets: A New Primitive for Data Mining. Classification of time series has been attracting great interest over the past decade. Recent empirical evidence has strongly suggested that the simple nearest neighbor algorithm is very difficult to beat for most time series problems. While…

  • Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds

    0 out of 5
    4,500

    Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds Abstract? Running sophisticated software on smart phones could result in poor performance and shortened battery lifetime because of their limited resources. Recently, of?oading computation workload to the cloud has become a promising solution to enhance both performance and battery life of smart phones. However, it…

  • Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles

    0 out of 5
    4,500

    Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles Abstract? Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles. Recently, two ideas have been explored that lead to more accurate algorithms for time-series classi?cation < Final Year Projects 2016 > TSC. First, it has been shown that the simplest way to gain improvement on TSC…

End of content

End of content