The Beauty of the Commons: Optimal Load Sharing by Base Station Hopping in Wireless Sensor Networks Abstract? The Beauty of the Commons: Optimal Load Sharing by Base Station Hopping in Wireless Sensor Networks. In wireless sensor networks < WSNs >, the base station (BS) is a critical sensor node whose failure causes severe data losses….
The Capacity of Wireless CSMA/CA Networks Abstract? The Capacity of Wireless CSMA/CA Networks. a poor understanding of the interactions among transmitters < Final Year Projects 2016 > wireless networks using carrier sense multiple access with collision avoidance (CSMA/CA) have been commonly stigmatized as unpredictable in nature. Even elementary questions regarding the throughput limitations of these…
The Integrated Surface Drought Index (ISDI) as an Indicator for Agricultural Drought Monitoring: Theory, Validation, and Application in Abstract?Based on the concept of the new drought index called Vegetation Drought Response Index (VegDRI) using data-mining technology, an Integrated Surface Drought Index (ISDI) was established in this study. ISDI improved the original model, adding remote sensed…
The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities Abstract?The Mason Test: A Defense Against Sybil Attacks in Wireless Networks WithoutTrusted Authorities. Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate in?uence. Many defenses based on spatial variability…
The Role Of Hubness For Clustering High Dimensional Data Abstract?The Role Of Hubness For Clustering High Dimensional Data. High-dimensional data arise naturally in many domains, and have regularly presented a great < Final Year Projects > challenge for traditional data mining techniques, both in terms of effectiveness and efficiency. Clustering becomes difficult due to the…
The Role of Location Popularity in Multicast Mobile Ad Hoc Networks Abstract? The Role of Location Popularity in Multicast Mobile Ad Hoc Networks. In the asymptotic analysis of large scale mobile networks, most previous works assume that nodes move in all the cells identically. We put forward this line of research by considering location popularity,…
The study and application of the improved region growing algorithm for liver segmentation Abstract?The study and application of the improved region growing algorithm for liver segmentation. In order to improve the accuracy of the medical image segmentation and reduce the effect of selecting seed points using region growing algorithm, an improved region growing method is…
The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks Abstract? The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks. The problem of user cost minimization in mobile cloud computing (MCC) networks. We consider a MCC model where multiple brokers assign cloud resources to mobile users. The model…
Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver Abstract? Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver. The increasing number of mobile devices and the demand for large throughput requiring applications has hampered access to the limited frequency spectrum. The goal of this…
Three Dimensional Data-Driven MultiScale Atomic Representation of Optical Coherence Tomography Abstract? Three Dimensional Data-Driven Multi Scale Atomic Representation of Optical Coherence Tomography. We discuss about applications of different methods for decomposing a signal over elementary wave forms chosen in a family called a dictionary atomic representations< Final Year Projects 2016 > in optical coherence tomography…
Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication Abstract? Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication. Brain-inspired circuits can provide an alternative solution to implement computing architectures taking advantage of fault tolerance and generalization ability of logic gates. In this brief, we advance over the memristive…