“An Automatic Graph-Based Approach for Artery/Vein Classification in Retinal Images” Abstract?”An Automatic Graph-Based Approach for Artery/Vein Classification in Retinal Images” The classification of retinal vessels into artery/vein (A/V) is an important phase for automating the detection of vascular changes, and for the calculation of characteristic signs associated with several systemic diseases such as diabetes, hypertension,…
An Efficient Multicore based Parallel Computing Approach for TSP Problems Abstract? TSP (Travelling Salesman Problem) is a typical problem in the scientific and business computing applications such as social network analysis, VLSI chip design, etc. However TSP is regarded as not only a combinatorial optimization problem but also a typical NP-hard problem, and becomes an…
Anonymization of centralized and distributed social network by sequential clustering. We study the problem of privacy-preservation in social networks. We consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data…
Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage Abstract?Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage. In personal computing devices that rely on a cloud storage environment for data backup, an imminent challenge facing source deduplication for cloud backup services is the low deduplication efficiency due to a…
ATOM: Efficient Tracking, Monitoring, and Orchestration of Cloud Resources Abstract– The emergence of Infrastructure as a Service framework brings new opportunities, which also accompanies with new challenges in auto scaling, resource allocation, and security. A fundamental challenge underpinning these problems is the continuous tracking and monitoring of resource usage in the system. In addition to…
Balancing performance accuracy precision secure cloud transaction Abstract?Balancing performance accuracy precision secure cloud transaction. In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of…
Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Abstract?In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of having the underlying authorization policies…
Byzantine failiure using control zones Abstract?Byzantine failiure using control zones.We consider the problem of reliably broadcasting messages in a network where some nodes are likely to fail. We consider the most general failure model: the Byzantine model, where the failing nodes have an arbitrary behavior, and may actively try to destabilize the network. We focus…
Caching and Prefetching for Web Content Distribution Abstract? Proxy caching is an effective technique to reduce the network resources consumed by web services as well as the access latencies perceived by web users. This article discusses the issues and challenges of deploying web caching proxies over the Internet. We focus on the cache management for…
Channel Quantization Using Constellation Based Codebooks for Multiuser MIMO-OFDM Abstract?Channel Quantization Using Constellation Based Codebooks for Multiuser MIMO-OFDM. In this paper, we propose clustered quantization techniques for multiuser multi-input/multi-output (MIMO) orthogonal frequency division multiplexing (OFDM) using constellation based codebooks. Constellation based codebooks provide scalability and efficient codeword search capability, < Final Year Projects > which…
CIDS-A framework for intrusion detection in cloud system Abstract? By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for “CIDS” a cloud based intrusion detection system, to solve the deficiencies of current IDSs.< Final Year Projects > CIDS also provides a component to summarize…