An Energy-Efficient L2 Cache Architecture UsingWay Tag Information Under Write-Through Policy Abstract-An Energy-Efficient L2 Cache Architecture UsingWay Tag Information Under Write-Through Policy. Many high-performance microprocessors employ cache write-through policy for performance improvement and at the same time achieving good tolerance to soft errors in on-chip caches. However, write-through policy also incurs large energy overhead due…
An Energy-Efficient Reliable Data Transmission Scheme for Complex Environmental Monitoring in Underwater Acoustic Sensor Networks Abstract? As an extension of wireless sensor network in underwater environment, underwater acoustic sensor networks (UASNs) have caused widespread concern of academia. In UASNs, the efficiency and reliability of data transmission are very challenging due to the complex underwater environment…
₹5,500Original price was: ₹5,500.₹4,500Current price is: ₹4,500.
An Energy-efficient Routing Algorithm for Software-defined Wireless Sensor Networks Abstract-Recent significant research on wireless sensor networks (WSNs) has led to the widespread adoption of software defined wireless sensor networks (SDWSNs), which can be reconfigured even after deployment. In this paper, we propose an energy-efficient routing algorithm for SDWSNs. In this algorithm, to make the network…
An Enhanced Fuzzy Similarity Based Concept Mining Model for Text Classification Using Feature Clustering Abstract? An Enhanced Fuzzy Similarity Based Concept Mining Model for Text Classification Using Feature Clustering. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File…
An Enhanced K-Means and ANOVA-Based Clustering Approach for Similarity Aggregation in Underwater Wireless Sensor Networks Abstract? Underwater wireless sensor networks (UWSNs) have recently been proposed as a way to observe and explore aquatic environments. Sensors in such networks are used to perform pollution monitoring, disaster prevention, or assisted navigation and to send monitored data to…
An Enterprise Ontology-Based Approach to Service Specification Abstract? the Web Service Definition Language (WSDL) and Universal Description Discovery Integration (UDDI) standards arose as ad hoc standards for the definition of service interfaces and service registries. However, even together these standards do not provide enough basis for a service consumer to get a full understanding…
An equalised global graphical model-based approach for multi-camera object tracking Abstract? Multi-camera non-overlapping visual object tracking system typically consists of two tasks: single camera object tracking and inter-camera object tracking. Since the state-of-theart approaches are yet not perform perfectly in real scenes, the errors in single camera object tracking module would propagate into the module…
An equalized global graph model-based approach for multi-camera object tracking Abstract? Non-overlapping multi-camera visual object tracking typically consists of two steps: single camera object tracking and inter-camera object tracking. Most of tracking methods focus on single camera object tracking, which happens in the same scene, while for real surveillance scenes, inter-camera object tracking is needed…
An evolutionary approach to complex schema matching Abstract? A special technique, called conditionally matching rules (CMRs), for the representation of transition functions of cellular automata (CA) and its application to the evolutionary design of complex multistate CA. < Final Year Projects > The problem of designing replicating loops in 2-D CA and the square…
An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs Abstract-How to achieve reliable routing has always been a major issue in the design of communication networks, among which mobile ad hoc networks (MANETs) possess the most adversarial networking environment due to the absence of fixed infrastructure, the nature of open transmission media and the…
An Expert System to Distinguish a Defective eye from a Normal eye Abstract?An Expert System to Distinguish a Defective eye from a Normal eye. Eyes are the organs of vision. Detection of most common differentiating characteristics of eye diseases from the fundus images of the retina can be a good approach as an automatic and…
An Explicit Shape-Constrained MRF-Based Contour Evolution Method for 2-D Medical Image Segmentation Abstract?An Explicit Shape-Constrained MRF-Based Contour Evolution Method for 2-D Medical Image Segmentation. Image segmentation is, in general, an ill-posed < Final Year Projects > problem and additional constraints need to be imposed in order to achieve the desired segmentation result. While segmenting organs…