• No results found

18 results with keyword: 'modelling covariance dynamics multivariate financial time series'

Proposed Protocol for Reliability and Security in Peer to Peer Networks

A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both "clients"

Protected

N/A

6
0
0
2020
THERMAL ANALYSIS OF PRINTED CIRCUIT BOARD (PCB) OF AVIONICS EQUIPMENT

In this paper , thermal behavior of highly heat dissipating components, temperature distribution on the board, Junction temperature are to be analyzed using

Protected

N/A

9
0
0
2020
Euler Numbers of Dichromatic Binary Images and the Inclusion Exclusion Property

Abstract — The relationship is explained between the Euler numbers of the red and green components of a dichromatic binary digital image and their union and intersection.. Index Terms

Protected

N/A

6
0
0
2020
Intrusion Detection and Prevention System in enhancing Security of Cloud Environment

The major benefits cloud computing provides is network based access to computing and data storage services on a pay per usage model.. While Cloud services provide

Protected

N/A

15
0
0
2020
A Novel Low Power Gray To Binary Code Converter Using Gate Diffusion Input(GDI)

In this paper we introduce a novel low power and Area efficient Gray to Binary code converter is implemented by using four transistor XOR gate.. This

Protected

N/A

6
0
0
2020
Design of High Speed Binary to Gray Code Converter Using A Novel Two Transistor XOR Gate

Adilakshmi Siliveru , ECE Department, Sree Vidyanikethan Egineering College (Autonomous), JNTUA, Anantapur. To reduce the power dissipation several code converters are

Protected

N/A

6
0
0
2020
Payment minimization and Error tolerant Resource Allocation for Cloud System Using equally spread current execution load

Keywords — cloud computing, equally spread current execution load, optimize response time, resource

Protected

N/A

8
0
0
2020
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

The authors in [5] proposed an admission control algorithm (ACA) which considered the effect of hidden terminals on available bandwidth estimation. However, none of

Protected

N/A

6
0
0
2020
Smart Traffic Light Control System for     Emergency Ambulance

In terms of data center, the software environments are used to build a database for data storing and implementing the proposed traffic light control algorithm

Protected

N/A

9
0
0
2020
Innovative Adaptive Acknowledgement Scheme for MANETs Using Eaack

Here we propose a strong new Intrusion detection mechanism called EAACK which requires less hardware cost. EAACK is an acknowledgement based IDS. This scheme uses

Protected

N/A

7
0
0
2020
Is ORB Efficient Over SURF for Object Recognition?

dissimilar objects. Put in other words, machine recognition of objects has remained challenging due to the significant variations exhibited by images including varying

Protected

N/A

6
0
0
2020
Design and Implementation of an Intelligent and Scalable Gateway with an integrated IVR, for transforming ordinary homes to Smart Homes/SOHOs

RFID Door Locking System: The locking system shown in figure 2 consists of an ATtiny microcontroller connected to a ZigBee transceiver to be wirelessly linked to the HUB.. A

Protected

N/A

6
0
0
2020
JM MODEL AND ITS VARIATIONS IN SOFTWARE RELIABILITY MODELING

A Modification to the Jelinski-Moranda Software Reliability Growth Model Based on Cloud Model Theory. Jewell Bayesian Software Reliability

Protected

N/A

8
0
0
2020
Performance analysis and Power Loss Management of reconfigurable UWB pulse generation through Dual Drive Mach Zehnder     Modulator

In this approach the distribution of UWB signals over optical fiber (UWBoF) extends the area of coverage and offers the availability of undisrupted service across

Protected

N/A

6
0
0
2020
Information encoding and decoding using Residue Number System for {22n 1, 22n, 22n+1} moduli sets

converter is computed using the full adder and is compared with equivalent best known state of the art forward and reverse converter, the proposed converter required

Protected

N/A

8
0
0
2020
An Effective Age Classification Based On Geometric Components Of the Face

To address this, the present work determines Geometric Components on Second Order picture Condense and Fuzzy Reduced Gray level (SICFRG) model, which decreases the

Protected

N/A

6
0
0
2020
Wireless Sensor Network Based Air Pollution Avoidance Monitoring System

Wireless Sensor Network Based Air Pollution Avoidance Monitoring

Protected

N/A

14
0
0
2020
Obstacle Avoidance Based on Ultrasonic Sensors and Optical Encoders

In this paper, an obstacle avoidance method was proposed, it is used to avoid obstacle that suddenly appeared in the navigation path of mobile robot, it helps the robot to return

Protected

N/A

8
0
0
2020

Upload more documents and download any material studies right away!