Showing 997–1008 of 1084 results

  • The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

    0 out of 5
    4,500

    The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities Abstract?The Mason Test: A Defense Against Sybil Attacks in Wireless Networks WithoutTrusted Authorities. Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate in?uence. Many defenses based on spatial variability…

  • The Role Of Hubness For Clustering High Dimensional Data

    0 out of 5
    4,500

    The Role Of Hubness For Clustering High Dimensional Data Abstract?The Role Of Hubness For Clustering High Dimensional Data. High-dimensional data arise naturally in many domains, and have regularly presented a great < Final Year Projects > challenge for traditional data mining techniques, both in terms of effectiveness and efficiency. Clustering becomes difficult due to the…

  • The Role of Location Popularity in Multicast Mobile Ad Hoc Networks

    0 out of 5
    4,500

    The Role of Location Popularity in Multicast Mobile Ad Hoc Networks Abstract? The Role of Location Popularity in Multicast Mobile Ad Hoc Networks. In the asymptotic analysis of large scale mobile networks, most previous works assume that nodes move in all the cells identically. We put forward this line of research by considering location popularity,…

  • The study and application of the improved region growing algorithm for liver segmentation

    0 out of 5
    4,500

    The study and application of the improved region growing algorithm for liver segmentation Abstract?The study and application of the improved region growing algorithm for liver segmentation. In order to improve the accuracy of the medical image segmentation and reduce the effect of selecting seed points using region growing algorithm, an improved region growing method is…

  • The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks

    0 out of 5
    4,500

    The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks Abstract? The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks. The problem of user cost minimization in mobile cloud computing (MCC) networks. We consider a MCC model where multiple brokers assign cloud resources to mobile users. The model…

  • Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver

    0 out of 5
    4,500

    Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver Abstract? Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver. The increasing number of mobile devices and the demand for large throughput requiring applications has hampered access to the limited frequency spectrum. The goal of this…

  • Three Dimensional Data-Driven Multi Scale Atomic Representation of Optical Coherence Tomography

    0 out of 5
    4,500

    Three Dimensional Data-Driven MultiScale Atomic Representation of Optical Coherence Tomography Abstract? Three Dimensional Data-Driven Multi Scale Atomic Representation of Optical Coherence Tomography. We discuss about applications of different methods for decomposing a signal over elementary wave forms chosen in a family called a dictionary atomic representations< Final Year Projects 2016 > in optical coherence tomography…

  • Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication

    0 out of 5
    4,500

    Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication Abstract? Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication. Brain-inspired circuits can provide an alternative solution to implement computing architectures taking advantage of fault tolerance and generalization ability of logic gates. In this brief, we advance over the memristive…

  • Thrift Society Automation

    0 out of 5
    4,500

    Thrift Society Automation Abstract? Thrift Society Automation. The payroll information presented below is an overview of the College payroll system. The Payroll Office is responsible for all pay-related functions which include biweekly and monthly payroll for all College student and staff employees. Applying federal and state payroll laws and regulations, Payroll strives to process timely…

  • Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    0 out of 5
    4,500

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Abstract? Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing. Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users IMUs < Final Year Projects 2016 > adjust their malicious behaviors according to their objectives and the network?s defense schemes….

  • Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    0 out of 5
    4,500

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Abstract? Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing. Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users IMUs < Final Year Projects 2016 > adjust their malicious behaviors according to their objectives and the network?s defense schemes….

  • Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison

    0 out of 5
    4,500

    Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison Abstract?Hardware implementation of cryptographic algorithms is subject to various attacks. It has been previously demonstrated that scan chains introduced for hardware testability open a back door to potential attacks. < Final Year Projects > Here, we propose a scan-protection scheme that provides testing facilities both at production…

End of content

End of content