Showing 49–60 of 2066 results

  • A Distributed Multi-Channel MAC Protocol for Ad Hoc Wireless Networks

    0 out of 5
    4,500

    A Distributed Multi-Channel MAC Protocol for Ad Hoc Wireless Networks Abstract?A novel distributed multi-channel medium access control < Final Year Projects 2016 > MAC protocol using fast and slow hopping sequences with dual radio interfaces. Speci?cally, one interface follows fast hopping and is primarily for transmission, and the other interface follows slow hopping and is…

  • A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

    0 out of 5
    4,500

    A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks Abstract? Hybrid wireless networks combining the advantages of both mobile ad-hoc networks and infrastructure wireless networks have been receiving increased attention due to their ultra-high performance. An ef?cient data routing protocol is important in such networks for high network capacity and scalability….

  • A Dynamic Image Matching Model and Architecture for Smart Devices

    0 out of 5
    3,500

    A Dynamic Image Matching Model and Architecture for Smart Devices. The aim of this research is on developing a dynamic image matching model (DIMM) for smart devices. People with no knowledge on searching keywords can see the information and make good use of it in their daily life. Although existing search engines (Google, Yahoo etc.)…

  • A family Particle Swarm Optimization based on the family tree

    0 out of 5
    3,500

    A family Particle Swarm Optimization based on the family tree Abstract?A family Particle Swarm Optimization based on the family tree. The concept of the family was previously introduced into Particle Swarm Optimization (PSO). To further study the multi-group structure of the Family PSO (FPSO), this paper introduces the family tree into the FPSO. It made…

  • Placeholder

    A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

    0 out of 5
    4,500

    A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data Abstract? A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data. Feature selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and…

  • A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

    0 out of 5
    4,500

    A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data Abstract? A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data.Feature selection involvesidentifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness points…

  • A fault-tolerant scheduling system for computational grids

    0 out of 5
    4,500

    A fault-tolerant scheduling system for computational grids Abstract? Fault-tolerant scheduling is an important issue for computational grid systems, as grids typically consist of strongly varying and geographically distributed resources. The main scheduling strategy of most fault-tolerant scheduling systems depends on the response time and fault index when selecting a resource to execute a certain job.<...

  • A Flexible Fully Hardwired CABAC Encoderfor UHDTV H.264/AVC High Profile Video

    0 out of 5
    4,500

    A Flexible Fully Hardwired CABAC Encoderfor UHDTV H.264/AVC High Profile Video Abstract– A Flexible Fully Hardwired CABAC Encoderfor UHDTV H.264/AVC High Profile Video. In this paper, a flexible CABAC encoder architecture for H.264/AVC encoder applications up to UHDTV (7680?4320) resolution is proposed. Stages of CABAC encoding are analyzed and a generalized CABAC architecture is designed….

  • A Flexible Low Power DSP With a Programmable Truncated Multiplier

    0 out of 5
    4,500

    A Flexible Low Power DSP With a Programmable Truncated Multiplier Abstract? A Flexible Low Power DSP With a Programmable Truncated Multiplier. Truncated multiplication reduces part of the power required by multipliers by only computing the most-significant bits of the product. The most common approach to truncation includes physical reduction of the partial product matrix and…

  • A Flexible Privacy enhanced Location Based Services System Framework and Practice

    0 out of 5
    4,500

    A Flexible Privacy enhanced Location Based Services System Framework and Practice Abstract? A Flexible Privacy enhanced Location Based Services System Framework and Practice. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections]…

  • Placeholder

    A Framework for Personal Mobile Commerce Pattern Mining and Prediction

    0 out of 5
    4,500

    A Framework for Personal Mobile Commerce Pattern Mining and Prediction Abstract? A Framework for Personal Mobile Commerce Pattern Mining and Prediction. Due to a wide range of potential applications, research on mobile commerce has received a lot of interests from both of the industry and academia. Among them, one of the active topic areas is…

  • A Framework to Eliminate Backdoors from Response-Computable Authentication

    0 out of 5
    4,500

    A Framework to Eliminate Backdoors from Response-Computable Authentication Abstract?A Framework to Eliminate Backdoors from Response-Computable AuthenticationResponse-computable authentication (RCA) is a two-party authentication model widely adopted by authentication systems, where an authentication system independently computes the expected user response and authenticates a user if the actual user response matches the expected value. Such authentication systems have…

End of content

End of content