Showing 397–408 of 1966 results

  • Autonomous Self-Optimization of Coverage and Capacity in LTE Cellular Networks

    0 out of 5
    4,500

    Autonomous Self-Optimization of Coverage and Capacity in LTE Cellular Networks Abstract? : Self-organizing networks promise significant expenditure savings for operators when rolling out modern cellular network infrastructure, such as Long-Term Evolution (LTE) and LTE-Advanced systems. Savings in capital expenditures (CAPEX) and operational expenditures (OPEX) can be achieved in both the network deployment and network operation…

  • Autonomous Self-Optimization of Coverage and Capacity in LTE Cellular Networks

    0 out of 5
    4,500

    Autonomous Self-Optimization of Coverage and Capacity in LTE Cellular Networks Abstract? Self-organizing networks promise Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video…

  • Autonomus mobile mesh network

    0 out of 5
    4,500

    Autonomus mobile mesh network   Abstract?Autonomus mobile mesh network Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On Demand * Remote Connectivity…

  • AWARE (Asymmetric Write Architecture with REdundant blocks): A High Write Speed STT-MRAM Cache Architecture

    0 out of 5
    4,500

    AWARE (Asymmetric Write Architecture with REdundant blocks): A High Write Speed STT-MRAM Cache Architecture Abstract?Spin-transfer torque magnetic RAM (STT-MRAM) is a promising memory technology for lower level caches because of its high density and nonvolatile nature. However, the high write latency is a bottleneck to its widespread adoption as the future on-chip memory. In this…

  • Background Subtraction Based on Low-Rank and Structured Sparse Decomposition

    0 out of 5
    4,500

    Background Subtraction Based on Low-Rank and Structured Sparse Decomposition Abstract? Background Subtraction Based on Low-Rank and Structured Sparse Decomposition. Low rank and sparse representation based methods, which make few speci?c assumptions about the background, have recently attracted wide attention in background modeling. With these methods, moving objects in the scene are modeled < Final Year...

  • Backward Path Growth for Efficient Mobile Sequential Recommendation

    0 out of 5
    4,500

    Backward Path Growth for Efficient Mobile Sequential Recommendation Abstract?Backward Path Growth for Efficient Mobile Sequential Recommendation. The problem of mobile sequential recommendation is to suggest a route connecting a set of pick-up points for a taxi driver so that he/she is more likely to get passengers with less travel cost. Essentially, a key challenge of…

  • Backward Path Growth for Efficient Mobile Sequential Recommendation

    0 out of 5
    4,500

    Backward Path Growth for Efficient Mobile Sequential Recommendation Abstract? Backward Path Growth for Efficient Mobile Sequential Recommendation. The problem of mobile sequential recommendation is to suggest a route connecting a set of pick-up points for a taxi driver so that he/she is more likely to get passengers with less travel cost. Essentially, a key challenge…

  • Bacterial foraging based hyper-heuristic for resource scheduling in grid computing

    0 out of 5
    4,500

    Bacterial foraging based hyper-heuristic for resource scheduling in grid computing Abstract?Grid Computing is an evolution of parallel and distributed computing that enables sharing of resources among the users of virtual organizations across the world. The core purpose behind evolution of Grid is to utilize the idle resources. The resource providers who lend their resources for…

  • Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study

    0 out of 5
    4,500

    Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study Abstract? Applications of cyber technologies improve the quality of monitoring and decision making in smart grid. These cyber technologies are vulnerable to malicious attacks, and compromising them can have serious technical and economical problems.< Final Year Project > This paper specifies the…

  • Balancing Blocks for Distributed File System in Clouds by Using Load Rebalancing Algoritham

    0 out of 5
    4,500

    Balancing Blocks for Distributed File System in Clouds by Using Load Rebalancing Algoritham Abstract? : Balancing Blocks for Distributed File System in Clouds by Using Load Rebalancing Algoritham. Distributed file systems are key building blocks for cloud computing applications based on the MapReduce programming paradigm. In such file systems, nodes simultaneously serve computing and storage…

  • Balancing performance accuracy precision secure cloud transaction

    0 out of 5
    4,500

    Balancing performance accuracy precision secure cloud transaction Abstract?Balancing performance accuracy precision secure cloud transaction. In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of…

  • Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions

    0 out of 5
    4,500

    Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Abstract?In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of having the underlying authorization policies…

End of content

End of content