Showing 3613–3624 of 3871 results

  • Three-Port-Converter-Based Single-Phase Bidirectional AC-DC Converter With Reduced Power Processing Stages and Improved Overall Efficiency

    Three-Port-Converter-Based Single-Phase Bidirectional AC-DC Converter With Reduced Power Processing Stages and Improved Overall Efficiency

    0 out of 5
    4,500

    Three-Port-Converter-Based Single-Phase Bidirectional AC-DC Converter With Reduced Power Processing Stages and Improved Overall Efficiency Abstract-Single-phase bidirectional AC-DC converters based on three-port converter (TPC) is proposed for energy storage applications. Three power interfacing ports, i.e. a DC-bus port, a DC input port and an AC port, are provided by the proposed converter. A battery, whose voltage…

  • Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication

    Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication

    0 out of 5
    4,500

    Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication Abstract? Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier Transform and Vedic Multiplication. Brain-inspired circuits can provide an alternative solution to implement computing architectures taking advantage of fault tolerance and generalization ability of logic gates. In this brief, we advance over the memristive…

  • Thrift Society Automation

    Thrift Society Automation

    0 out of 5
    4,500

    Thrift Society Automation Abstract? Thrift Society Automation. The payroll information presented below is an overview of the College payroll system. The Payroll Office is responsible for all pay-related functions which include biweekly and monthly payroll for all College student and staff employees. Applying federal and state payroll laws and regulations, Payroll strives to process timely…

  • Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    0 out of 5
    4,500

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Abstract? Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing. Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users IMUs < Final Year Projects 2016 > adjust their malicious behaviors according to their objectives and the network?s defense schemes….

  • Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    0 out of 5
    4,500

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Abstract? Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing. Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users IMUs < Final Year Projects 2016 > adjust their malicious behaviors according to their objectives and the network?s defense schemes….

  • Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison

    Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison

    0 out of 5
    4,500

    Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison Abstract?Hardware implementation of cryptographic algorithms is subject to various attacks. It has been previously demonstrated that scan chains introduced for hardware testability open a back door to potential attacks. < Final Year Projects > Here, we propose a scan-protection scheme that provides testing facilities both at production…

  • Time saving protocol for data accessing in cloud computing

    Time saving protocol for data accessing in cloud computing

    0 out of 5
    4,500

    Time saving protocol for data accessing in cloud computing Abstract-Cloud computing is a very trending technology because of its efficiency, cost effectiveness, pay-per-use, flexibility and scalability. Data security and access control are two significant issues experienced while availing these advantages of cloud computing. Access control can be defined as a procedure by which a user…

  • Time Series Database Preprocessing for Data Mining Using Python

    Time Series Database Preprocessing for Data Mining Using Python

    0 out of 5

    Time Series Database Preprocessing for Data Mining Using Python Abstract-Database Preprocessing for Data Mining Using Python lays the groundwork for data mining. Before the discovery of useful information/knowledge, the target data set must be properly prepared. Using Data Mining in census data has very high learning value and vast marketplace space. While census data are…

  • Time Series Shapelets: A New Primitive for Data Mining

    Time Series Shapelets: A New Primitive for Data Mining

    0 out of 5
    4,500

    Time Series Shapelets: A New Primitive for Data Mining Abstract? Time Series Shapelets: A New Primitive for Data Mining. Classification of time series has been attracting great interest over the past decade. Recent empirical evidence has strongly suggested that the simple nearest neighbor algorithm is very difficult to beat for most time series problems. While…

  • Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds

    Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds

    0 out of 5
    4,500

    Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds Abstract? Running sophisticated software on smart phones could result in poor performance and shortened battery lifetime because of their limited resources. Recently, of?oading computation workload to the cloud has become a promising solution to enhance both performance and battery life of smart phones. However, it…

  • Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach

    Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach

    0 out of 5
    5,500

    Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach Abstract? With the ever-increasing demands on multimedia applications, cloud computing, due to its economical but powerful resources, is becoming a natural platform to process, store, and share multimedia contents. However, the employment of cloud computing also brings new security and privacy issues as…

  • Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles

    Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles

    0 out of 5
    4,500

    Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles Abstract? Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles. Recently, two ideas have been explored that lead to more accurate algorithms for time-series classi?cation < Final Year Projects 2016 > TSC. First, it has been shown that the simplest way to gain improvement on TSC…

End of content

End of content