Showing 193–204 of 1911 results

  • Placeholder

    A System to Filter Unwanted Messages from OSN User Walls

    0 out of 5
    4,500

    A System to Filter Unwanted Messages from OSN User Walls Abstract? One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide little support to this requirement. < Final...

  • Placeholder

    A T o p – r Feature Selection Algorithm for Microarray Gene Expression Data

    0 out of 5
    4,500

    A T o p – r Feature Selection Algorithm for Microarray Gene Expression Data Abstract?Feature selection from microarray data has become an ever evolving area of research. Numerous techniques have widely been applied for extraction of genes which are expressed differentially in microarray data. Some of these comprise of studies related to fold-change approach, <...

  • A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks

    0 out of 5
    4,500

    A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks Abstract?Wireless sensor networks < Final Year Projects 2016 > WSNs are transitioning to real-world applications, where they face attacks already experienced by the Internet and wireless ad hoc networks. One such attack is that of denial-of-service (DOS), which we believe will only become more prevalent as…

  • A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud

    0 out of 5
    4,500

    A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud Abstract?A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud. Big sensor data is prevalent in both industry and scientific research applications where the data is generated with high volume and velocity it is difficult to process using on-hand…

  • A Traffic Adaptive Multi-channel MAC Protocol with Dynamic Slot Allocation for WSNs

    0 out of 5
    4,500

    A Traffic Adaptive Multi-channel MAC Protocol with Dynamic Slot Allocation for WSNs Abstract?A Traffic Adaptive Multi-channel MAC Protocol with Dynamic Slot Allocation for WSNs. Using low duty-cycle is the most common technique to extend the system lifetime in WSNs. However, it also implies limited throughput and long delay and the penalty is even higher under…

  • Placeholder

    A Transformerless Grid-Connected Photovoltaic System Based on the Coupled Inductor Single-Stage Boost Three-Phase Inverter

    0 out of 5
    4,500

    A Transformerless Grid-Connected Photovoltaic System Based on the Coupled Inductor Single-Stage Boost Three-Phase Inverter Abstract? A Transformerless Grid-Connected Photovoltaic System Based on the Coupled Inductor Single-Stage Boost Three-Phase Inverter. This letter presents a modulation technique for the modified coupled-inductor single-stage boost inverter (CL-SSBI)-based grid-connected photovoltaic (PV) system. This technique can reduce the system leakage current…

  • A Trigger Identification Service for Defending Reactive Jammers in WSN

    0 out of 5
    4,500

    A Trigger Identification Service for Defending Reactive Jammers in WSN Abstract?A Trigger Identification Service for Defending Reactive Jammers in WSN. During the last decade, Reactive Jamming Attack has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. Considering…

  • A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks

    0 out of 5
    4,500

    A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks Abstract? A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks. In the harsh environment where node density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join…

  • A Two-Level FH-CDMA Scheme for Wireless Communication Systems over Fading Channels

    0 out of 5
    4,500

    A Two-Level FH-CDMA Scheme for Wireless Communication Systems over Fading Channels Abstract– A Two-Level FH-CDMA Scheme for Wireless Communication Systems over Fading Channels. In this paper, we propose a “two-level” frequency-hopping code-division multiple-access (FH-CDMA) scheme for wireless communication systems. The new scheme provides flexibility in the selection of modulation codes and FH patterns. By partitioning…

  • Placeholder

    A Two-Level Topic Model Towards Knowledge Discovery from Citation Networks

    0 out of 5
    4,500

    A Two-Level Topic Model Towards Knowledge Discovery from Citation Networks Abstract? A Two-Level Topic Model Towards Knowledge Discovery from Citation Networks. Knowledge discovery from scientific articles has received increasing attention recently since huge repositories are made available by the development of the Internet and digital databases. In a corpus of scientific articles such as a…

  • Placeholder

    A Unifying Model and Analysis of P2P VoD Replication and Scheduling

    0 out of 5
    4,500

    A Unifying Model and Analysis of P2P VoD Replication and Scheduling Abstract?A Unifying Model and Analysis of P2P VoD Replication and Scheduling. We consider a peer-to-peer (P2P)-assisted video-on-demand (VoD) system where each peer can store a relatively small number of movies to offload the server when these movies are requested. User requests are stochastic based…

  • Placeholder

    A Unifying Model and Analysis of P2P VoD Replication and Scheduling

    0 out of 5
    4,500

    A Unifying Model and Analysis of P2P VoD Replication and Scheduling Abstract?We consider a peer-to-peer (P2P)-assisted video-on-demand (VoD) system where each peer can store a relatively small number of movies to offload the server when these movies are requested. User requests are stochastic based on some movie popularity distribution. The problem is how to replicate…

End of content

End of content