Showing 37–48 of 665 results

  • A Low-Complexity Turbo Decoder Architecture forEnergy-Efficient Wireless Sensor Networks

    0 out of 5
    4,500

    A Low-Complexity Turbo Decoder Architecture forEnergy-Efficient Wireless Sensor Networks Abstract-A Low-Complexity Turbo Decoder Architecture forEnergy-Efficient Wireless Sensor Networks. Turbo codes have recently been considered for energy-constrained wireless communication applications, since they facilitate a low transmission energy consumption. However, in order to reduce the overall energy consumption, lookup table-log-BCJR (LUT-Log-BCJR) architectures having a low processing energy…

  • A MAC Sensing Protocol Designfor Data Transmission with More Protection to Primary Users.

    0 out of 5
    4,500

    A MAC Sensing Protocol Designfor Data Transmission with More Protection to Primary Users. Abstract?MAC protocols to sense channels for data transmission have been widely investigated for the secondary users to efficiently utilize and share the spectrum licensed by the primary user. One important issue associated with MAC protocols design is how the secondary users determine…

  • Placeholder

    A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts

    0 out of 5
    4,500

    A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts Abstract?The Machine Learning (ML) field has gained its momentum in almost any domain of research and just recently has become a reliable tool in the medical domain.< Final Year Project > The empirical domain of automatic learning is used in tasks such as medical…

  • Placeholder

    A Mechanism Design Approach to Resource Procurement in Cloud Computing

    0 out of 5
    4,500

    A Mechanism Design Approach to Resource Procurement in Cloud Computing Abstract? A Mechanism Design Approach to Resource Procurement in Cloud Computing. We present a cloud resource procurement approach which not only automates the selection of an appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud resource procurement: cloud-dominant strategy…

  • A Methodology for Direct and Indirect Discrimination Prevention in Data Mining

    0 out of 5
    4,500

    A Methodology for Direct and Indirect Discrimination Prevention in Data Mining Abstract? Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. There are, however, negative social perceptions about data mining, among which potential privacy invasion and potential discrimination. The latter consists of unfairly treating people on the…

  • Placeholder

    A Methodology for Direct and Indirect Discrimination Prevention in Data Mining.

    0 out of 5
    4,500

    A Methodology for Direct and Indirect Discrimination Prevention in Data Mining. Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. There are, however, negative social perceptions about data mining, among which potential privacy invasion and potential discrimination. The latter consists of unfairly treating people on the basis…

  • Placeholder

    A Modified Back propagation Learning Algorithm With Added Emotional Coefficients

    0 out of 5
    4,500

    A Modified Back propagation Learning Algorithm With Added Emotional Coefficients Abstract?Much of the research work into artificial intelligence (AI) has been focusing on exploring various potential applications of intelligent systems with successful results in most cases. In our attempts to model human intelligence< Final Year Project >by mimicking the brain structure and function, we overlook…

  • A Multi-stage Method for Text-To-Pronunciation Conversion

    0 out of 5
    4,500

    A Multi-stage Method for Text-To-Pronunciation Conversion Abstract? A Multi-stage Method for Text-To-Pronunciation Conversion Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On…

  • Placeholder

    A Neural Approach for overall Improvement of OFDM System

    0 out of 5
    4,500

    A Neural Approach for overall Improvement of OFDM System Abstract?A Neural Approach for overall Improvement of OFDM System. This paper presents a neural network based, high power amplifier (HPA) characteristics independent adaptive method for compensation of nonlinear distortions for orthogonal frequency division multiplexing signals. Major elements that contribute to multipath fading effects are also considered…

  • Placeholder

    A New Algorithm for Inferring User Search Goals with Feedback Sessions

    0 out of 5
    4,500

    A New Algorithm for Inferring User Search Goals with Feedback Sessions Abstract? A New Algorithm for Inferring User Search Goals with Feedback Sessions. For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search goals can be very…

  • Placeholder

    A New Algorithm for Inferring User Search Goals with Feedback Sessions.

    0 out of 5
    4,500

    A New Algorithm for Inferring User Search Goals with Feedback Sessions.For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search goals can be very useful in improving search engine relevance and user experience. In this paper, we…

  • Placeholder

    A new approach to video-Based traffic surveillance using Fuzzy Hybrid Information Inference Mechanism

    0 out of 5
    4,500

    A new approach to video-Based traffic surveillance using Fuzzy Hybrid Information Inference Mechanism Abstract?This study proposes a new approach to video-based traffic surveillance using a fuzzy hybrid information inference mechanism (FHIIM). The three major contributions of the proposed approach are background updating, vehicle detection with block-based segmentation, and vehicle tracking with error compensation. During background…

End of content

End of content