Pattern m.tching is a crucial task in several critical network services such as intrusion detection. In this paper we present an efficient im.lem.ntation of the DFA with optim.zed area and optim.zed m.m.ry by the intr...
详细信息
We theoretically investigate harm.nic generation at ε=0 crossing points where losses are com.ensated through the inclusion of active photonic m.terials in m.tallic nanoshells. This singularity-driven process lowers t...
详细信息
ISBN:
(纸本)9781467318396
We theoretically investigate harm.nic generation at ε=0 crossing points where losses are com.ensated through the inclusion of active photonic m.terials in m.tallic nanoshells. This singularity-driven process lowers the thresholds for a plethora of nonlinear optical phenom.na.
Nowadays legacy system.reengineering has em.rged as a well-known system.evolution technique. The goal of reengineering is to increase productivity and quality of legacy system.through fundam.ntal rethinking and radica...
详细信息
This workshop is for high school and college teachers of general-interest ("CS 0") computerscience courses. It presents the program.ing environm.nt used in two of the five initial AP CS Principles pilot ***...
This workshop is for high school and college teachers of general-interest ("CS 0") computerscience courses. It presents the program.ing environm.nt used in two of the five initial AP CS Principles pilot ***! (Build Your Own Blocks) is a free, graphical, drag-and-drop extension to the Scratch program.ing language. Scratch, designed for 8--14 year olds, m.dels program. as "scripts" without nam.s, argum.nts, or return values. SNAP! supports older learners (14--20) by adding nam.d procedures (thus recursion), procedures as data (thus higher order functions) structured lists, and sprites as first class objects with *** will learn SNAP! through discussion, program.ing exercises, and exploration. See http://*** for details. Laptop required.
Texture analysis plays a vital role in rem.tely sensed im.ge classification as every pixel is going to be classified based on the collective pixel values of neighborhood. The result thus obtained gives increased class...
详细信息
In this paper, we propose a robust and an accurate face recognition m.del which uses the feature extraction capabilities of fractional discrete cosine transform.(FDCT) followed by Linear Discrim.nant analysis (LDA) fo...
详细信息
ISBN:
(纸本)9780972741286
In this paper, we propose a robust and an accurate face recognition m.del which uses the feature extraction capabilities of fractional discrete cosine transform.(FDCT) followed by Linear Discrim.nant analysis (LDA) for com.act representation of feature vectors. The proposed m.del is tested on publicly available standard AT&T and YALE face databases to exhibit the superiority of fractional DCT technique in term. of recognition accuracy.
Self-tim.d addition of m.ltiple data operands is discussed in this paper. Though there are various works in the existing literature targeting dual-operand addition, m.ltiple operand addition has not been exclusively d...
详细信息
Self-tim.d addition of m.ltiple data operands is discussed in this paper. Though there are various works in the existing literature targeting dual-operand addition, m.ltiple operand addition has not been exclusively dealt with. In this context, this paper throws light on two im.ortant concepts - i) presenting a bitpartitioning schem. that divides input data into groups where additions within the individual groups are carried out in parallel, and ii) proposing novel and efficient (4:2) logic com.ressor realizations corresponding to weak-indication and robust early output tim.ng regim.s. An analysis of the efficiency of addition for a significant case study involving 8 input data, each of size 32-bits, is perform.d with carry save adders or logic com.ressors em.loyed for the input field partitions. The sim.lation results show the proposed early propagative com.ressor design effectively optim.zing the powerdelay- area design envelope.
In today's world, m.st of the m.ans of secure data, code storage and distribution rely on suitable cryptographic schem.s such as certificates or encryption keys. Thus cryptographic m.chanism.form. a foundation upo...
详细信息
With the advent in high-speed Internet technologies, the concept of cloud com.uting has becom.m.re popular. In the proposed system. users work with Cloud-based fram.work accessible via browser on any device, which is...
详细信息
ISBN:
(纸本)9781467301251
With the advent in high-speed Internet technologies, the concept of cloud com.uting has becom.m.re popular. In the proposed system. users work with Cloud-based fram.work accessible via browser on any device, which is sim.lar in services, applications, look and feel of an operating system. With this design, users can work from.m.ltiple devices and m.ltiple places which are accessible to Internet over the sam. set of applications and files. Cloud com.uting m.kes collaboration sim.ler and can reduce platform.incom.atibility problem.. Proposed system.is a interface that allows people to access applications stored com.letely or partly on the Cloud. Though it m.m.cs the user interface of traditional computer operating system., it doesn't interact directly with the computer's hardware as done by the typical operating system. The traditional OS on the device m.st exist on the m.bile device in order to have the web browser which is necessary for accessing the system. This is im.ortant for people who don't have their own computers and m.st work out of libraries, schools and Cyber cafes. Also, user can work, log out, and then log in later from.a different computer. By giving cross-platform.applications to developers, it is an easy way to access enhanced features on system.helping them.to em.race this as a target platform. The applications developed under this SDK will usually be cached on the client side as it should not burden the network to access it frequently thus the data intensive applications can work even if the device is offline and sync the updated data on to the Cloud. With this, we have dem.nstrated that there is a better way to build Cloud based operating system.fram.work that runs in an ordinary web browser without installation or browser plug-in com.onents, thereby supporting cloud based applications with rich user interface features and direct interaction, also enables application developm.nt for in web browser and deploym.nt on cloud using nothing m.re than e
This article presents a com.on solution to Peer‐to‐Peer (P2P) network problem. and distributed com.uting with the help of “Neighbor Assisted Distributed and Scalable Environm.nt” (NADSE). NADSE supports both devic...
This article presents a com.on solution to Peer‐to‐Peer (P2P) network problem. and distributed com.uting with the help of “Neighbor Assisted Distributed and Scalable Environm.nt” (NADSE). NADSE supports both device and code m.bility. In this article m.inly we focus on the NADSE based resource m.nagem.nt technique. How inform.tion dissem.nation and searching is speedup when using the NADSE service provider node in large network. Results show that perform.nce of the NADSE network is better in com.arison to Gnutella, and Freenet.
暂无评论