< Final Year Project > A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks With Order-Optimal Per-Flow Delay Abstract? Quantifying the end-to-end delay performance in multihop wireless networks is a well-known challenging problem. In this paper, we propose a new joint congestion control and scheduling algorithm for multihop wireless networks with fixed-route flows…
A MAC Sensing Protocol Designfor Data Transmission with More Protection to Primary Users. Abstract?MAC protocols to sense channels for data transmission have been widely investigated for the secondary users to efficiently utilize and share the spectrum licensed by the primary user. One important issue associated with MAC protocols design is how the secondary users determine…
A Methodology for Direct and Indirect Discrimination Prevention in Data Mining Abstract? Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. There are, however, negative social perceptions about data mining, among which potential privacy invasion and potential discrimination. The latter consists of unfairly treating people on the…
A Methodology for Direct and Indirect Discrimination Prevention in Data Mining. Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. There are, however, negative social perceptions about data mining, among which potential privacy invasion and potential discrimination. The latter consists of unfairly treating people on the basis…
A Modified Back propagation Learning Algorithm With Added Emotional Coefficients Abstract?Much of the research work into artificial intelligence (AI) has been focusing on exploring various potential applications of intelligent systems with successful results in most cases. In our attempts to model human intelligence< Final Year Project >by mimicking the brain structure and function, we overlook…
A New Algorithm for Inferring User Search Goals with Feedback Sessions.For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search goals can be very useful in improving search engine relevance and user experience. In this paper, we…
A new approach to video-Based traffic surveillance using Fuzzy Hybrid Information Inference Mechanism Abstract?This study proposes a new approach to video-based traffic surveillance using a fuzzy hybrid information inference mechanism (FHIIM). The three major contributions of the proposed approach are background updating, vehicle detection with block-based segmentation, and vehicle tracking with error compensation. During background…
A New Coding Mode for Hybrid Video Coders Based on Quantized Motion Vectors AbstractThe rate allocation tradeoff between motion vectors and transform coefficients has a major importance when it comes to efficient video compression. This paper introduces a new coding mode for an H.264/AVC-like video coder, which improves the management of this resource allocation. The…
A NOVEL FACTS COMPENSATION SCHEME FOR POWER QUALITY IMPROVEMENT IN WIND SMART GRID Abstract? presents a novel FACTS based Static Switched Filter Compensation (SSFC) scheme. This FACTS SSFC scheme is an effective power quality mitigation, voltage stabilization, power losses reduction and power factor enhancement tool for wind schemes interfaced with Smart Grid-Distribution Networks. The FACTS…
A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem Abstract? A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud Abstract? A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database…