A High-Performance FIR Filter Architecture for Fixed and Reconfigurable Applications Abstract?Transpose form finite-impulse response (FIR) filters are inherently pipelined and support multiple constant multiplications (MCM) technique that results in significant sav-ing of computation. However, transpose form configuration does not directly support the block processing unlike direct-form configuration. < final year projects > [numbers_sections number=”1″ title=”Including…
A Low-Power Robust Easily Cascaded PentaMTJ-Based Combinational and Sequential Circuits Abstract?Advanced computing systems embed spintronic devices to improve the leakage performance of conventional CMOS systems. High speed, low power, and infinite endurance are important properties of magnetic tunnel junction (MTJ), a spintronic device, which assures its use in memories and logic circuits. < final year...
A Micro-GA Embedded PSO Feature Selection Approach to Intelligent Facial Emotion Recognition Abstract?This paper proposes a facial expression recognition system using evolutionary particle swarm optimization (PSO)-based feature optimization. The system first employs modified local binary patterns, which conduct horizontal and vertical neighborhood pixel comparison, to generate a discriminative initial facial representation. < final year projects...
A Novel Zero-Voltage-Switching Push?Pull High-Frequency-Link Single-Phase Inverter Abstract?The accuracy of wireless network packet simulation critically depends on the quality of wireless channel models. Path loss is the stationary component of the channel model affected by the shadowing in the environment. Existing path loss models are inaccurate, require excessive measurement or computational overhead, and/or often cannot…
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing Abstract?Never before have data sharing been more convenient with the rapid development and wide adoption of cloud computing. However, how to ensure the cloud user?s data security is becoming the main obstacles that hinder cloud computing from extensive adoption. Proxy re-encryption serves as…
A Survey of Task Allocation and Load Balancing in Distributed Systems Abstract?In past decades, significant attention has been devoted to the task allocation and load balancing in distributed systems. Although there have been some related surveys about this subject, each of which only made a very preliminary review on the state of art of one…
Adaptive and Channel Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks Abstract?Wireless sensor networks (WSNs) are vulnerable to selective forwarding attacks that can maliciously drop a subset of forwarding packets to degrade network performance and jeop-ardize the information integrity. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code…
An Efficient SVD Based Method for Image Denoising Abstract?Nonlocal self-similarity of images has attracted considerable interest in the field of image processing and has led to several state-of-the-art image denoising algorithms, such as block matching and 3-D, principal component analysis with local pixel grouping, patch-based locally optimal wiener, and spatially adaptive iterative singular-value thresholding. <...
An Empirical Study for PCA- and LDA-Based Feature Reduction for Gas Identification Abstract?Increasing the number of sensors in a gas identification system generally improves its performance as this will add extra features for analysis. However, this affects the com-putational complexity, especially if the identification algorithm is to be implemented on a hardware platform. < final…
An Optimization Framework for Mobile Data Collection in Energy-Harvesting Wireless Sensor Networks Abstract?Recent advances in environmental energy harvesting technologies have provided great potentials for traditional battery-powered sensor networks to achieve perpetual operations. Due to dynamics from the temporal profiles of ambient energy sources [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete…
Attribute Based Data Sharing Scheme Revisited in Cloud Computing Abstract?Ciphertext-policy attribute-based encryp-tion (CP-ABE) is a very promising encryption technique for secure data sharing in the context of cloud computing. Data owner is allowed to fully control the access policy associated with his data which to be shared. < final year projects > [numbers_sections number=”1″ title=”Including…
Delay Dependent Stability Control for Power System With Multiple Time Delays Abstract?Time-delay exists widely in electric power systems, and is found to have significant effect on the performance of operation and control under certain conditions. It is shown that even avery small delay may destabilize the power system < final year projects > [numbers_sections number=”1″…