Showing 997–1008 of 1075 results

  • Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    0 out of 5
    4,500

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Abstract? Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing. Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users IMUs < Final Year Projects 2016 > adjust their malicious behaviors according to their objectives and the network?s defense schemes….

  • Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    0 out of 5
    4,500

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Abstract? Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing. Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users IMUs < Final Year Projects 2016 > adjust their malicious behaviors according to their objectives and the network?s defense schemes….

  • Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison

    0 out of 5
    4,500

    Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison Abstract?Hardware implementation of cryptographic algorithms is subject to various attacks. It has been previously demonstrated that scan chains introduced for hardware testability open a back door to potential attacks. < Final Year Projects > Here, we propose a scan-protection scheme that provides testing facilities both at production…

  • Time Series Shapelets: A New Primitive for Data Mining

    0 out of 5
    4,500

    Time Series Shapelets: A New Primitive for Data Mining Abstract? Time Series Shapelets: A New Primitive for Data Mining. Classification of time series has been attracting great interest over the past decade. Recent empirical evidence has strongly suggested that the simple nearest neighbor algorithm is very difficult to beat for most time series problems. While…

  • Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds

    0 out of 5
    4,500

    Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds Abstract? Running sophisticated software on smart phones could result in poor performance and shortened battery lifetime because of their limited resources. Recently, of?oading computation workload to the cloud has become a promising solution to enhance both performance and battery life of smart phones. However, it…

  • Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles

    0 out of 5
    4,500

    Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles Abstract? Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles. Recently, two ideas have been explored that lead to more accurate algorithms for time-series classi?cation < Final Year Projects 2016 > TSC. First, it has been shown that the simplest way to gain improvement on TSC…

  • Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management

    0 out of 5
    3,500

    Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management Abstract? Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management. Distributed mobility management DMM is a promising technology to address the mobile data traf?c explosion problem. Since the location information of mobile < Final Year Project 2016 > nodes (MNs)…

  • TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

    0 out of 5
    4,500

    TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Abstract? TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage. Attribute-based Encryption (ABE) is regarded as a promising cryptographic conducting tool to guarantee data owners? direct control over their data in public cloud storage. The earlier…

  • To improve Blood Donation Process using Data Mining Techniques

    0 out of 5
    4,500

    To improve Blood Donation Process using Data Mining Techniques Abstract? To improve Blood Donation Process using Data Mining Techniques. Blood is the vital thing for human being because there is no alternative for replacing it. This makes it necessary for the presence of a system for predicting continuous behavior of healthy blood donors in blood…

  • Top-k Similarity Join in Heterogeneous Information Networks

    0 out of 5
    4,500

    Top-k Similarity Join in Heterogeneous Information Networks Abstract? Top-k Similarity Join in Heterogeneous Information Networks. As a newly emerging network model, heterogeneous information networks < Final Year Projects 2016 > have received growing attention. Many data mining tasks have been explored in HINs, including clustering, classi?cation, and similarity search. Similarity join is a fundamental operation…

  • Topological Modeling and Classification of Mammographic Microcalcification Clusters

    0 out of 5
    4,500

    Topological Modeling and Classification of Mammographic Microcalcification Clusters Abstract? Topological Modeling and Classification of Mammographic Microcalcification Clusters. Goal:The presence of microcalcification clusters is a primary sign of breast cancer; however, it is difficult and time consuming for radiologists to classify microcalcifications as malig-nant or benign. In this paper, a novel method for the classification of…

  • Tour Package Management

    0 out of 5
    3,500

    Tour Package Management Abstract?A novel double diode package (footprint D2PAK compatible) was designed, simulated, and fabricated using an innovative embedding process with electroplated large-area copper contact metallizations on both sides of the chip. The package was also experimentally characterized regarding the thermal performance using two different test methods: < Final Year Projects > a test…

End of content

End of content