A Novel Two-Split Capacitor Array with Linearity Analysis for High-Resolution SAR ADCs Abstract? A Novel Two-Split Capacitor Array with Linearity Analysis for High-Resolution SAR ADCs. A novel two-split capacitor < Final Year Projects 2016 > T-SC array structure for Successive Approximation Register (SAR) analog-to-digital converter (ADC) is proposed. When used as digital ?to-analog converter (DAC),…
A Novel VLSI DHT Algorithm for a Highly Modular and Parallel Architecture Abstract?A new very large scale integration (VLSI) algorithm for a 2N-length discrete Hartley transform (DHT) that can be efficiently implemented on a highly modular and parallel VLSI architecture having a regular structure is presented. The DHT algorithm can be efficiently split on several…
A Novel Zero-Voltage-Switching Push?Pull High-Frequency-Link Single-Phase Inverter Abstract?The accuracy of wireless network packet simulation critically depends on the quality of wireless channel models. Path loss is the stationary component of the channel model affected by the shadowing in the environment. Existing path loss models are inaccurate, require excessive measurement or computational overhead, and/or often cannot…
A P2P-Based Market-Guided Distributed Routing Mechanism for High-Throughput Hybrid Wireless Networks Abstract? A P2P-Based Market-Guided Distributed Routing Mechanism for High-Throughput Hybrid Wireless Networks. A hybrid wireless network that combines a mobile ad-hoc network and an infrastructure network, ef?cient and reliable data routing is important for high throughput. Existing routing schemes that simply combine ad-hoc and…
A P2P-Botnet Detection Model and Algorithms Based on Network Streams Analysis Abstract?A P2P-Botnet Detection Model and Algorithms Based on Network Streams Analysis. Aimed at the situation that it is difficult to detect the peer-to-peer (P2P) botnet, < Final Year Projects > we provide a new method for detection based on the analysis network streams. Firstly,…
A Pan-Sharpening Based on the Non-Subsampled Contourlet Transform Application to Worldview-2 Imagery Abstract?A Pan-Sharpening Based on the Non-Subsampled Contourlet Transform Application to Worldview-2 Imagery. Two pan-sharpening methods based on the non-subsampled contourlet transform (NSCT) are proposed. NSCT is very efficient in representing the directional information and capturing intrinsic geometrical structures of the objects. It has…
A Parallel Digital VLSI Architecture for Integrated Support Vector Machine Training and Classification Abstract?A parallel digital VLSI architecture for combined support vector machine < Final Year Projects 2016 > SVM training and classi?cation. For the ?rst time, cascade SVM, a powerful training algorithm, is leveraged to signi?cantly improve the scalability of hardware-based SVM training and…
A Parallel Edge Preserving Algorithm for Salt and Pepper Image Denoising Abstract? A Parallel Edge Preserving Algorithm for Salt and Pepper Image Denoising. In this paper a two-phase filter for removing ?salt and pepper? noise is proposed. In the first phase, an adaptive median filter is used to identify the set of the noisy pixels;…
A Personalized Web Search Based on User Profile and User Clicks Abstract? A Personalized Web Search Based on User Profile and User Clicks. Generally web search engines are built to serve all users, independent of the individual needs of any user. Personalization of web search is to carry out retrieval for each user incorporating their…
A Power-Efficient Continuous-Time Incremental Sigma-Delta ADC for Neural Recording Systems Abstract? An analog-to-digital converter (ADC) dedicated to neural recording systems. By using two continuous-time incremental sigma-delta ADCs in a pipeline con?guration, the proposed ADC can achieve high-resolution without sacri?cing the conversion rate. This two-step architecture is also power-ef?cient, as the resolution requirement for the incremental…
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud Abstract? Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data-intensive applications without infrastructure investment. Along the processing of such applications, a large volume of intermediate data sets will be generated,…
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services Abstract? A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. The number of mobile users has dramatically risen in recent years. In this paper, an ef?cient authentication scheme for distributed mobile cloud computing services is proposed. The proposed scheme provides security and convenience for…