Showing 1633–1644 of 2067 results

  • Reliable Low-Power Multiplier Design Using Fixed-Width Replica Redundancy Block

    Reliable Low-Power Multiplier Design Using Fixed-Width Replica Redundancy Block

    0 out of 5
    4,500

    Reliable Low-Power Multiplier Design Using Fixed-Width Replica Redundancy Block Abstract? Reliable Low-Power Multiplier Design Using Fixed-Width Replica Redundancy Block. A reliable low-power multiplier design by adopting algorithmic noise tolerant ANT architecture with the ?xed-width multiplier to build the reduced precision replica redundancy block (RPR). < Final Year Project 2016 >The proposed ANT architecture can meet…

  • Remote sensing aboned land classificaiton

    Remote sensing aboned land classificaiton

    0 out of 5
    4,500

    Remote sensing aboned land classificaiton Abstract?Remote sensing aboned land classificaiton. The land surface process model PROMET is used to simulate the nitrogen cycle of two large winter wheat fields (115 and 87 ha) in Northern Germany in dependence of the prevailing meteorology and the given fertilizations (site specific and homogeneous). Through assimilation of remote sensing…

  • Remote Sensing Image Segmentation by Combining Spectral and Texture Features

    Remote Sensing Image Segmentation by Combining Spectral and Texture Features

    0 out of 5
    4,500

    Remote Sensing Image Segmentation by Combining Spectral and Texture Features Abstract?Remote Sensing Image Segmentation by Combining Spectral and Texture Features. We present a new method for remote sensing image segmentation, which utilizes both spectral and texture information. Linear filters are used to provide enhanced spatial patterns. For each pixel location, we compute combined spectral and…

  • Removal of Ocular Artifacts in EEG?An Improved Approach Combining DWT and ANC for Portable Applications

    Removal of Ocular Artifacts in EEG?An Improved Approach Combining DWT and ANC for Portable Applications

    0 out of 5
    4,500

    Removal of Ocular Artifacts in EEG?An Improved Approach Combining DWT and ANC for Portable Applications   Abstract-A new model to remove ocular artifacts (OA) from electroencephalograms (EEGs) is presented. The model is based on discrete wavelet transformation (DWT) and adaptive noise cancellation (ANC). Using simulated and measured data, the accuracy of the model is compared…

  • Removing DUST using Multiple Alignment of Sequences

    Removing DUST using Multiple Alignment of Sequences

    0 out of 5
    4,500

    Removing DUST using Multiple Alignment of Sequences Abstract? Removing DUST using Multiple Alignment of Sequences. A large number of URLs collected by web crawlers correspond to pages with duplicate or near-duplicate contents. To crawl, store,< Final Year Project 2016 > and use such duplicated data implies a waste of resources, the building of low quality…

  • Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm

    Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm

    0 out of 5
    4,500

    Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm Abstract? A peer-to-peer system, a node should estimate reputation of other peers not only on the basis of its own interaction, but also on the basis of expression of other nodes. Reputation aggregation mechanism implements strategy for achieving this. Reputation aggregation in peer to peer networks…

  • Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems

    Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems

    0 out of 5
    4,500

    Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems Abstract? Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems. Web service recommendation systems can help service users to locate the right service from the large number of available web services. Avoiding recommending dishonest or unsatisfactory services is a fundamental…

  • Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems

    Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems

    0 out of 5
    4,500

    Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems Abstract?Web service recommendation systems can help service users to locate the right service from the large number of available web services. Avoiding recommending dishonest or unsatisfactory services is a fundamental research problem in the design of web service recommendation systems. Reputation of web…

  • Research on Data Fusion Method for Archaeological Site Identification

    Research on Data Fusion Method for Archaeological Site Identification

    0 out of 5
    4,500

    Research on Data Fusion Method for Archaeological Site Identification   Abstract?China is the only country in the world with continuous ancient civilization whose history can be traced for more than 5000 years. With the rapid development of remote sensing, abundant remote sensing data of the same site by different remote sensors are available at the…

  • Research Publication Management

    Research Publication Management

    0 out of 5
    3,500

    Research Publication Management Abstract?Research Publication Management. In the Web services environment, service level agreement (SLA) refers to mutually agreed understandings and expectations of the evaluation criteria for service quality between service providers and customers. In this paper, we put forward a complete SLA management model including the lifecycle definition of SLA management for Web services,…

  • Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior

    Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior

    0 out of 5
    4,500

    Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior. A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes the temporal and spatial locality to extract the behavior features of the proxy-to-server traffic, which makes the scheme independent of the traffic intensity and…

  • Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory

    Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory

    0 out of 5
    4,500

    Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory Abstract?Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory, In this paper, we propose a method of constructing a virtual coordinate system (ABVCap) in wireless sensor networks where location information is not available. A routing protocol based on ABVCap virtual…

End of content

End of content