Showing 733–744 of 3871 results

  • ASRQ: Automatic Segment Repeat Request for IEEE 802.15.4-Based WBAN

    ASRQ: Automatic Segment Repeat Request for IEEE 802.15.4-Based WBAN

    0 out of 5
    4,500

    ASRQ: Automatic Segment Repeat Request for IEEE 802.15.4-Based WBAN Abstract– In the first place, wireless body area network (WBAN), In addition, Mobile Computing high data reliability and long operating time are important requirements. Mobile Computing retransmission process of the default Automatic Repeat reQuest (ARQ) mechanism in IEEE 802.15.4 is a suitable method to ensure the…

  • Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks

    Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks

    0 out of 5
    5,500

    Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks Abstract? The resource allocation and management issues related to heterogeneous wireless systems made up of several radio access technologies (RATs) that collectively provide a unified wireless network to a diverse set of users through co-ordination managed by a centralized global resource controller (GRC). We…

  • Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing

    Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing

    0 out of 5
    4,500

    Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing Abstract? Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • Assessing the Suitability of King Topologies for Interconnection Networks

    Assessing the Suitability of King Topologies for Interconnection Networks

    0 out of 5
    5,500

    Assessing the Suitability of King Topologies for Interconnection Networks Abstract? In the late years many different interconnection networks have been used with two main tendencies. One is characterized by the use of high- degree routers with long wires while the other uses routers of much smaller degree. The latter rely on two- dimensional mesh and…

  • Matlab_Dip

    Assistive Clothing Pattern Recognition for Visually Impaired People

    0 out of 5
    4,500

    Assistive Clothing Pattern Recognition for Visually Impaired People Abstract? Assistive Clothing Pattern Recognition for Visually Impaired People. Choosing clothes with complex patterns and colors is a challenging task for visually impaired people. Automatic clothing pattern recognition is also a challenging research problem due to rotation, scaling, illumination, and especially large intraclass pattern variations. We have…

  • Associate Cable tv operators usingandroid

    Associate Cable tv operators usingandroid

    0 out of 5
    3,500

    Associate Cable tv operators usingandroid Abstract?With the rapid development of IPTV technologies, traditional cable TV operators are facing fierce competitions from telecom operators who are gradually adopting the IPTV technology step by step. On the other hand, < Final Year Projects > cable TV operators are also on the way to become triple-play service operators….

  • Asthma Pattern Identification via Continuous Diaphragm Motion Monitoring

    Asthma Pattern Identification via Continuous Diaphragm Motion Monitoring

    0 out of 5
    5,500

    Asthma Pattern Identification via Continuous Diaphragm Motion Monitoring Abstract? Ultrasound imaging has been widely used in bio-medical imaging diagnosis for a long history because of its merits: no radiation, high penetration depth, and real-time imaging capability. In this paper, we propose an ultrasound-based system that monitors respiratory status of asthma subjects via detecting of diaphragm…

  • ATOM: Efficient Tracking, Monitoring, and Orchestration of Cloud Resources

    ATOM: Efficient Tracking, Monitoring, and Orchestration of Cloud Resources

    0 out of 5
    4,500

    ATOM: Efficient Tracking, Monitoring, and Orchestration of Cloud Resources Abstract– The emergence of Infrastructure as a Service framework brings new opportunities, which also accompanies with new challenges in auto scaling, resource allocation, and security. A fundamental challenge underpinning these problems is the continuous tracking and monitoring of resource usage in the system. In addition to…

  • Attendence management system

    Attendence management system

    0 out of 5
    4,500

    Attendence management system Abstract-The student attendance management system project used to maintain College students attendance records. The attendance project has three user modules for run the system Admin, Staff and Student. Initially the system will be blank; The Administrator has rights to create standard and same time he has to add staff detail. Administrator generates…

  • Attribute Based Data Sharing Scheme Revisited in Cloud Computing

    Attribute Based Data Sharing Scheme Revisited in Cloud Computing

    0 out of 5

    Attribute Based Data Sharing Scheme Revisited in Cloud Computing Abstract?Ciphertext-policy attribute-based encryp-tion (CP-ABE) is a very promising encryption technique for secure data sharing in the context of cloud computing. Data owner is allowed to fully control the access policy associated with his data which to be shared. < final year projects > [numbers_sections number=”1″ title=”Including…

  • .NET Projects - cloud Computing

    Attribute Based Encryption with dynamic membership

    0 out of 5
    4,500

    Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing Abstract?Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing. Attribute-based encryption (ABE) is an advanced encryption technology where the privacy of receivers is protected by a set of attributes. An encryptor can ensure that only the…

  • Attribute Based Secure Mailing In College Campus

    Attribute Based Secure Mailing In College Campus

    0 out of 5
    3,500

    Attribute Based Secure Mailing In College Campus Abstract?Attribute Based Secure Mailing In College Campus. Stress and Anxiety negatively affect mental health and can lead a number of debilitating impacts to overall health and well being. In the recent past, adolescents are becoming increasingly afflicted with Stress and Anxiety. In this paper, we report our findings…

End of content

End of content