Showing 37–48 of 3870 results

  • Placeholder

    A Cloud Computing Based Telemedicine Service

    0 out of 5
    4,500

    A Cloud Computing Based Telemedicine Service Abstract?Health is the greatest possession?. Various techniques are drawn for the better treatment of health of society. As the technology is reaching its peak, it is emerging in medical treatments quickly and fruitfully giving birth to ?telemedicine? – invention of technology in medicine. Earlier slow and erroneous processes are…

  • Placeholder

    A Cloud-oriented Content Delivery Network Paradigm: Modeling and Assessment

    0 out of 5
    4,500

    A Cloud-oriented Content Delivery Network Paradigm: Modeling and Assessment Abstract?A Cloud-oriented Content Delivery Network Paradigm: Modeling and Assessment. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…

  • A Clustering-tree Topology Control Based on the Energy Forecast for Heterogeneous Wireless Sensor Networks

    0 out of 5
    4,500

    A Clustering-tree Topology Control Based on the Energy Forecast for Heterogeneous Wireless Sensor Networks Abstract-How to design an energy-efficient algorithm to maximize the network lifetime in complicated scenarios is a critical problem for heterogeneous wireless sensor networks (HWSN). In this paper, a clustering-tree topology control algorithm based on the energy forecast (CTEF) is proposed for…

  • A CMOS High-Voltage Transmitter IC forUltrasound Medical Imaging Applications

    0 out of 5
    4,500

    A CMOS High-Voltage Transmitter IC forUltrasound Medical Imaging Applications Abstract-A CMOS High-Voltage Transmitter IC forUltrasound Medical Imaging Applications. A high-voltage (HV) transmitter integrated circuit for ultrasound medical imaging applications is implemented using 0.18-?m bipolar/CMOS/DMOS technology. The proposed HV transmitter achieves high integration by only employing standard CMOS transistors in a stacked configuration with dynamic gate…

  • A CMOS Ultrawideband Pulse Generator for 3?5 GHz Applications

    0 out of 5
    4,500

    Automobile Spare Shop(Android App) Abstract-A low-power ultrawideband (UWB) pulse generator based on pulsed oscillator architecture for 3?5 GHz applications is proposed. The pulsed oscillator is improved, so it realizes binary phase shift keying (BPSK) modulation. Unlike ON?OFF keying or pulse-position modulation (PPM), BPSK can scramble the spectrum, so it can be used in high pulse…

  • Placeholder

    A Coarse to Fine Minutiae-Based Latent Palmprint Matching

    0 out of 5
    4,500

    A Coarse to Fine Minutiae-Based Latent Palmprint Matching Abstract? The availability of live-scan palmprint technology, high resolution palmprint recognition has started to receive significant attention in forensics and law enforcement. In forensic applications, latent palmprints provide critical evidence as it is estimated that about 30 percent of the latents recovered at crime scenes are those…

  • A Cocktail Approach for Travel Package Recommendation

    0 out of 5
    4,500

    A Cocktail Approach for Travel Package Recommendation Abstract? Recent years have witnessed an increased interest in recommender systems. Despite significant progress in this field, there still remain numerous avenues to explore. Indeed, this paper provides a study of exploiting online travel information for personalized travel package recommendation. A critical challenge along this line is to…

  • A Cold Start Recommendation System Using Item Correlation and User Similarity

    0 out of 5
    4,500

    A Cold Start Recommendation System Using Item Correlation and User Similarity Abstract? Conventional recommendation systems tend to focus on variations of well-known information retrieval techniques. We took a fresh approach, rather than to follow the traditional, commonly applied recommendation methodology of creating a user-item matrix, and then using them to make recommendations. Instead, we established…

  • A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks

    0 out of 5
    4,500

    A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks Abstract– In the first place, spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary…

  • A Collaborative DDoS Defence Framework using Network Function Virtualization

    0 out of 5
    4,500

    A Collaborative DDoS Defence Framework using Network Function Virtualization Abstract-High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one of the top security concerns as the DDoS attacks volumes are increasing constantly. Among them the SYN Flood attack is the most common type. Conventional DDoS defense solutions may not bepreferable since…

  • A Collaborative DDoS Defence Framework using Network Function Virtualization

    0 out of 5
    4,500

    Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data Abstract-High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one of the top security concerns as the DDoS attacks volumes are increasing constantly. Among them the SYN Flood attack is the most common type. Conventional DDoS defense solutions may…

  • A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing

    0 out of 5
    4,500

    A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing Abstract– Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback in urgent need of solution is…

End of content

End of content