An Adaptive Cloud Downloading Service. Our paper presents solutions using erasure coding, parallel connections to storage cloud and limited chunking (i.e., dividing the object into a few smaller segments) together to significantly improve the delay performance of uploading and downloading data in and out of cloud storage. TOFEC is a strategy that helps front-end proxy…
An Adaptive Receiver Design for OFDM Systems Using Conjugate Transmission Abstract? An Adaptive Receiver Design for OFDM Systems Using Conjugate Transmission. In this paper, we propose an adaptive receiver for efficient intercarrier interference (ICI) cancellation in orthogonal frequency division multiplexing (OFDM) systems using two-path conjugate transmission. This receiver design is based on the phase rotated…
An Adaptive System Based on Roadmap Profiling to Enhance Warning Message Dissemination in VANETs Abstract? In recent years, new applications, architectures, and technologies have been proposed for vehicular ad hoc networks (VANETs). Regarding traffic safety applications for VANETs, warning messages have to be quickly and smartly disseminated in order to reduce the required dissemination…
An approach to generalization of fuzzy TOPSIS method Abstract? An approach to generalization of fuzzy TOPSIS method. Due to the vagueness of human being thinking, decision-makers prefer to use hesitant fuzzy linguistic sets (HFLSs) to estimate the alternatives. Some methods of HFLSs have been researched based on the more familiar means such as the arithmetic…
“An Automatic Graph-Based Approach for Artery/Vein Classification in Retinal Images” Abstract?”An Automatic Graph-Based Approach for Artery/Vein Classification in Retinal Images” The classification of retinal vessels into artery/vein (A/V) is an important phase for automating the detection of vascular changes, and for the calculation of characteristic signs associated with several systemic diseases such as diabetes, hypertension,…
An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks Abstract?Address assignment is a key challenge in ad hoc networks due to the lack of infrastructure.< Final Year Project > Autonomous addressing protocols require a distributed and self-managed mechanism to avoid address collisions in a dynamic network with fading channels, frequent…
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing Abstract? In cloud computing, data owners host their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, this new paradigm of data hosting service also introduces new security challenges,…
An efficient Facial Features extraction Technique for Face Recognition system Using Local Binary Patterns Abstract?Face expression recognition is a typical task to make human and machine interaction possible. Besides this, medical science and other applications demand for such system. This paper focusses on importance of face detection and its feature parts.< Final Year Project…
An efficient Multiple Object Detection and tracking framework for automatic counting and video surveillance application Abstract?Automatic visual object counting and video surveillance have important applications for home and business environments, such as security and management of access points. However, in order to obtain a satisfactory performance these technologies need professional and expensive hardware, complex…
An efficient tree-based algorithm for mining sequential patterns with multiple Abstract? Mining frequent sequences is a step in the sequential patterns discovering, and sequential patterns mining is an important area of research in the field of data mining. If we use the traditional algorithms such as Apriori or GSP algorithm to discover the sequential patterns…
An Embedded Real-Time Finger-Vein Recognition System for Mobile Devices Abstract?The development of consumer electronics, the demand for simple, convenient, and high-security authentication systems for protecting private information stored in mobile devices has steadily increased. In consideration of emerging requirements for information protection, biometrics, which uses human physiological or behavioral features for personal identification, has been…