Showing 1873–1884 of 2014 results

  • The Small World of File Sharing.

    The Small World of File Sharing.

    0 out of 5
    4,500

    The Small World of File Sharing. Web caches, content distribution networks, peer-to-peer file-sharing networks, distributed file systems, and data grids all have in common that they involve a community of users who use shared data. In each case, overall system performance can be improved significantly by first identifying and then exploiting the structure of community’s…

  • The study and application of the improved region growing algorithm for liver segmentation

    The study and application of the improved region growing algorithm for liver segmentation

    0 out of 5
    4,500

    The study and application of the improved region growing algorithm for liver segmentation Abstract?The study and application of the improved region growing algorithm for liver segmentation. In order to improve the accuracy of the medical image segmentation and reduce the effect of selecting seed points using region growing algorithm, an improved region growing method is…

  • The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks

    The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks

    0 out of 5
    4,500

    The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks Abstract? The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks. The problem of user cost minimization in mobile cloud computing (MCC) networks. We consider a MCC model where multiple brokers assign cloud resources to mobile users. The model…

  • Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver

    Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver

    0 out of 5
    4,500

    Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver Abstract? Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver. The increasing number of mobile devices and the demand for large throughput requiring applications has hampered access to the limited frequency spectrum. The goal of this…

  • Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers

    Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers

    0 out of 5
    4,500

    Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers Abstract?Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers. Decreasing the soaring energy cost is imperative < Final Year Projects > in large data centers. Meanwhile, limited computational resources need to be fairly allocated among different organizations. Latency is another major concern for resource…

  • Three Dimensional Data-Driven Multi Scale Atomic Representation of Optical Coherence Tomography

    Three Dimensional Data-Driven Multi Scale Atomic Representation of Optical Coherence Tomography

    0 out of 5
    4,500

    Three Dimensional Data-Driven MultiScale Atomic Representation of Optical Coherence Tomography Abstract? Three Dimensional Data-Driven Multi Scale Atomic Representation of Optical Coherence Tomography. We discuss about applications of different methods for decomposing a signal over elementary wave forms chosen in a family called a dictionary atomic representations< Final Year Projects 2016 > in optical coherence tomography…

  • Three-Level PWM Floating H-Bridge Sinewave Power Inverter for High-Voltage and High-Efficiency Applications

    Three-Level PWM Floating H-Bridge Sinewave Power Inverter for High-Voltage and High-Efficiency Applications

    0 out of 5
    5,500

    Three-Level PWM Floating H-Bridge Sinewave Power Inverter for High-Voltage and High-Efficiency Applications Abstract?This paper presents a topology of a single-phase float-ing full-bridge three-level pulse width modulation (PWM) power inverter suitable for high-voltage/high-power dc?ac conversion. High power efficiency is obtained thanks to the slow (50/60 Hz) biasing of the H-bridge power supply terminals, allowed by a…

  • Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication

    Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication

    0 out of 5
    4,500

    Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication Abstract? Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication. Brain-inspired circuits can provide an alternative solution to implement computing architectures taking advantage of fault tolerance and generalization ability of logic gates. In this brief, we advance over the memristive…

  • Thrift Society Automation

    Thrift Society Automation

    0 out of 5
    4,500

    Thrift Society Automation Abstract? Thrift Society Automation. The payroll information presented below is an overview of the College payroll system. The Payroll Office is responsible for all pay-related functions which include biweekly and monthly payroll for all College student and staff employees. Applying federal and state payroll laws and regulations, Payroll strives to process timely…

  • Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    0 out of 5
    4,500

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Abstract? Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing. Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users IMUs < Final Year Projects 2016 > adjust their malicious behaviors according to their objectives and the network?s defense schemes….

  • Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    0 out of 5
    4,500

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Abstract? Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing. Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users IMUs < Final Year Projects 2016 > adjust their malicious behaviors according to their objectives and the network?s defense schemes….

  • Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison

    Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison

    0 out of 5
    4,500

    Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison Abstract?Hardware implementation of cryptographic algorithms is subject to various attacks. It has been previously demonstrated that scan chains introduced for hardware testability open a back door to potential attacks. < Final Year Projects > Here, we propose a scan-protection scheme that provides testing facilities both at production…

End of content

End of content