Showing 889–900 of 1330 results

  • Novel 16-QAM and 64-QAM Near-Complementary Sequences With Low PMEPR in OFDM Systems

    Novel 16-QAM and 64-QAM Near-Complementary Sequences With Low PMEPR in OFDM Systems

    0 out of 5
    5,500

    Novel 16-QAM and 64-QAM Near-Complementary Sequences With Low PMEPR in OFDM Systems Abstract? A novel construction of 16-quadrature amplitude modulation (QAM) near-complementary sequences with low peak-to-mean envelope power ratio (PMEPR) in orthogonal frequency division multiplexing (OFDM) systems.The proposed 16-QAM near-complementary sequences can be constructed by utilizing novel nonlinear offsets, where the length of the sequences…

  • Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks

    Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks

    0 out of 5
    5,500

    Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks Abstract? In wireless sensor networks, the secure end-to-end data communication is needed to collect data from source to destination. Collected data are transmitted in a path consisting of connected links. All existing end-to-end routing protocols propose solutions in which each link uses a pairwise…

  • Novel Radiation-Hardened-by-Design (RHBD) 12T Memory Cell for Aerospace Applications in Nanoscale CMOS Technology

    Novel Radiation-Hardened-by-Design (RHBD) 12T Memory Cell for Aerospace Applications in Nanoscale CMOS Technology

    0 out of 5
    4,500

    Vehicle Service Remainder (Android App) Abstract-In this paper, a novel radiation-hardened-by-design (RHBD) 12T memory cell is proposed to tolerate single node upset and multiple-node upset based on upset physical mechanism behind soft errors together with reasonable layout-topology. The verification results obtained confirm that the proposed 12T cell can provide a good radiation robustness. Compared with…

  • NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users

    NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users

    0 out of 5
    4,500

    NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users Abstract-Today, cloud storage becomes one of the critical services, because users can easily modify and share data with others in cloud. However, the integrity of shared cloud data is vulnerable to inevitable hardware faults, software failures or human errors. To ensure…

  • NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users

    NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users

    0 out of 5
    4,500

    NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users Abstract-Today, cloud storage becomes one of the critical services, because users can easily modify and share data with others in cloud. However, the integrity of shared cloud data is vulnerable to inevitable hardware faults, software failures or human errors. To ensure…

  • Object Co-segmentation for Irrelevant Video Frames Involved in Multimedia

    Object Co-segmentation for Irrelevant Video Frames Involved in Multimedia

    0 out of 5
    4,500

    Object Co-segmentation for Irrelevant Video Frames Involved in Multimedia Abstract-In the first place, despite the fact that there have been a lot of past work on video segmentation technique, it is still a difficult task to extricate the video objects precisely without interactions, particularly for those videos which contain irrelevant frames (frames containing no normal…

  • Object recognition using rotation invariant local binary pattern of significant bit planes

    Object recognition using rotation invariant local binary pattern of significant bit planes

    0 out of 5
    5,500

    Object recognition using rotation invariant local binary pattern of significant bit planes Abstract? The binary feature descriptors such as binary robust independent elementary features (BRIEF), oriented rotated binary robust independent elementary features (ORB), and fast retina keypoint (FREAK) usually perform binarisation on the intensity comparisons, thus they lo se some useful information. In this study,…

  • Ocular Recognition for Blinking Eyes

    Ocular Recognition for Blinking Eyes

    0 out of 5
    4,500

    Ocular Recognition for Blinking Eyes Abstract– Ocular recognition is expected to provide a higher flexibility in handling practical applications as oppose to the iris recognition, which only works for the ideal open-eye case. However, the accuracy of the recent efforts is still far from satisfactory at uncontrollable conditions, such as eye blinking which implies any…

  • OFDM Receiver Structure for a Subband-Selective Mitigation of Time-Variant Interference

    OFDM Receiver Structure for a Subband-Selective Mitigation of Time-Variant Interference

    0 out of 5
    5,500

    OFDM Receiver Structure for a Subband-Selective Mitigation of Time-Variant Interference Abstract? System performance of orthogonal frequency-division multiplexing (OFDM) degrades in the presence of time-variant frequency-selective interference. In the literature, several pulse-blanking concepts have been introduced over the past few years, which are promising ways to mitigate impulsive interference for OFDM reception. However, blanking yields an…

  • Offline Course Learning System

    Offline Course Learning System

    0 out of 5
    6,500

    Offline Course Learning System Abstract? Distance Learning Off-line is a mode of delivery that does not require Internet access. You do not have to come to campus. Instead, you will follow the directions given in the course syllabus, complete and submit your assignment and take your exams by the deadlines given in the class calendar,…

  • OMASS: One Memory Access Set Separation

    OMASS: One Memory Access Set Separation

    0 out of 5
    5,500

    OMASS: One Memory Access Set Separation Abstract?In a router, this functionality can be used to deter mine the next hop of an incoming packet. This problem is generally known as set separation and has been widely studied. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation…

  • OMASS: One Memory Access Set Separation

    OMASS: One Memory Access Set Separation

    0 out of 5
    5,500

    OMASS: One Memory Access Set Separation Abstract? In a router, this functionality can be used to deter mine the next hop of an incoming packet. This problem is generally known as set separation. A known approach is to use a collection of Bloom filters in parallel. Such schemes can require several memory access es, a…

End of content

End of content