Showing 97–108 of 1083 results

  • A Reduced – complexity MIMO Receiver via Channel Ordering

    0 out of 5
    4,500

    A Reduced – complexity MIMO Receiver via Channel Ordering Abstract?We consider the problem of maximum likelihood (ML) signal detection in multiple-input multiple-output (MIMO) wireless communication systems. We propose a new preprocessing algorithm in the form of channel ordering for sphere decoders. Numerical results show that this new channel ordering leads to significantly lower complexity (in…

  • A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks

    0 out of 5
    4,500

    A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks Abstract?A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks. This paper proposes the first resource allocation scheme in the literature to support scalable-video multicast for WiMAX relay networks. We prove that when the < Final Year Projects > available bandwidth…

  • A Review of Anomaly based Intrusion Detection Systems

    0 out of 5
    4,500

    A Review of Anomaly based Intrusion Detection Systems Abstract? With the advent of anomaly-based intrusion detection systems, many approaches and techniques have been developed to track novel attacks on the systems. High detection rate of 98% at a low alarm rate of 1% can be achieved by using these techniques. Though anomaly-based approaches are efficient,…

  • Placeholder

    A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds

    0 out of 5
    4,500

    A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds Abstract?A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds.Cloud computing is emerging as a new computing paradigm in the healthcare sector besides other business domains. Large numbers of health organizations have started shifting the electronic health information to the cloud environment. Introducing…

  • A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

    0 out of 5
    4,500

    A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Abstract? Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements,…

  • A secure remote user mutual authentication scheme using smart cards

    0 out of 5
    4,500

    A secure remote user mutual authentication scheme using smart cards Abstract? Authentication thwarts unauthorised users from accessing resources in insecure network environments. Password authentication based on smart cards is one of the simplest and most ef?cient authentication methods and is commonly deployed to authenticate the legitimacy of remote users. Based on cryptographic techniques, several password…

  • A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection

    0 out of 5
    4,500

    A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection Abstract? A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection. Some authors have approached the instance selection problem from a meta-learning perspective. In their work, they try to ?nd relationships between the performance of some methods from this ?eld and…

  • Placeholder

    A Similarity Measure for Text Classification and Clustering

    0 out of 5
    4,500

    A Similarity Measure for Text Classification and Clustering Abstract?A Similarity Measure for Text Classification and Clustering. Measuring the similarity between documents is an important operation in the text processing field. In this paper, a new similarity measure is proposed. To compute the similarity between two documents with respect to a feature, < Final Year Projects...

  • A Similarity-Based Learning Algorithm Using Distance Transformation

    0 out of 5
    4,500

    A Similarity-Based Learning Algorithm Using Distance Transformation Abstract? Numerous theories and algorithms have been developed to solve vectorial data learning problems by searching for the hypothesis that best ?ts the observed training sample. However, many real-world applications involve samples that are not described as feature vectors, but as (dis)similarity data. Converting vectorial data into <...

  • Placeholder

    A Space-Bounded Anytime Algorithm for the Multiple Longest Common Subsequence Problem

    0 out of 5
    4,500

    A Space-Bounded Anytime Algorithm for the Multiple Longest Common Subsequence Problem Abstract?A Space-Bounded Anytime Algorithm for the Multiple Longest Common Subsequence Problem. The multiple longest common subsequence (MLCS) problem, related to the identification of sequence similarity, is an important problem in many fields. As an NP-hard problem, its exact algorithms have difficulty in handling large-scale…

  • A Strategy of Clustering Modification Directions in Spatial Image Steganography

    0 out of 5
    4,500

    A Strategy of Clustering Modification Directions in Spatial Image Steganography Abstract? Most of the recently proposed steganographic schemes are based on minimizing an additive distortion function de?ned as the sum of embedding costs for individual pixels. In such an approach, mutual embedding impacts are often ignored. In this paper, we present an approach that can…

  • A Synergetic Use of Bloom Filters for Error Detection and Correction

    0 out of 5
    4,500

    A Synergetic Use of Bloom Filters for Error Detection and Correction Abstract? Bloom ?lters (BFs) provide a fast and ef?cient way to check whether a given element belongs to a set. The BFs are used in numerous applications, for example, in communications and networking. There is also ongoing research to extend and enhance BFs and…

End of content

End of content