Showing 25–36 of 109 results

  • An Automatic Graph-Based Approach for Artery/Vein Classification in Retinal Images

    An Automatic Graph-Based Approach for Artery/Vein Classification in Retinal Images

    0 out of 5
    4,500

    “An Automatic Graph-Based Approach for Artery/Vein Classification in Retinal Images” Abstract?”An Automatic Graph-Based Approach for Artery/Vein Classification in Retinal Images” The classification of retinal vessels into artery/vein (A/V) is an important phase for automating the detection of vascular changes, and for the calculation of characteristic signs associated with several systemic diseases such as diabetes, hypertension,…

  • An Efficient Multicore based Parallel Computing Approach for TSP Problems

    An Efficient Multicore based Parallel Computing Approach for TSP Problems

    0 out of 5
    4,500

    An Efficient Multicore based Parallel Computing Approach for TSP Problems Abstract? TSP (Travelling Salesman Problem) is a typical problem in the scientific and business computing applications such as social network analysis, VLSI chip design, etc. However TSP is regarded as not only a combinatorial optimization problem but also a typical NP-hard problem, and becomes an…

  • Anonymization of centralized and distributed social network by sequential clustering

    Anonymization of centralized and distributed social network by sequential clustering

    0 out of 5
    4,500

    Anonymization of centralized and distributed social network by sequential clustering. We study the problem of privacy-preservation in social networks. We consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data…

  • Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage

    Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage

    0 out of 5
    4,500

    Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage   Abstract?Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage. In personal computing devices that rely on a cloud storage environment for data backup, an imminent challenge facing source deduplication for cloud backup services is the low deduplication efficiency due to a…

  • Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing

    Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing

    0 out of 5
    4,500

    Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing Abstract? Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • ATOM: Efficient Tracking, Monitoring, and Orchestration of Cloud Resources

    ATOM: Efficient Tracking, Monitoring, and Orchestration of Cloud Resources

    0 out of 5
    4,500

    ATOM: Efficient Tracking, Monitoring, and Orchestration of Cloud Resources Abstract– The emergence of Infrastructure as a Service framework brings new opportunities, which also accompanies with new challenges in auto scaling, resource allocation, and security. A fundamental challenge underpinning these problems is the continuous tracking and monitoring of resource usage in the system. In addition to…

  • Balancing performance accuracy precision secure cloud transaction

    Balancing performance accuracy precision secure cloud transaction

    0 out of 5
    4,500

    Balancing performance accuracy precision secure cloud transaction Abstract?Balancing performance accuracy precision secure cloud transaction. In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of…

  • Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions

    Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions

    0 out of 5
    4,500

    Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Abstract?In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of having the underlying authorization policies…

  • Byzantine failiure using control zones

    Byzantine failiure using control zones

    0 out of 5
    4,500

    Byzantine failiure using control zones Abstract?Byzantine failiure using control zones.We consider the problem of reliably broadcasting messages in a network where some nodes are likely to fail. We consider the most general failure model: the Byzantine model, where the failing nodes have an arbitrary behavior, and may actively try to destabilize the network. We focus…

  • Caching and Prefetching for Web Content Distribution

    Caching and Prefetching for Web Content Distribution

    0 out of 5
    5,500

    Caching and Prefetching for Web Content Distribution Abstract? Proxy caching is an effective technique to reduce the network resources consumed by web services as well as the access latencies perceived by web users. This article discusses the issues and challenges of deploying web caching proxies over the Internet. We focus on the cache management for…

  • Channel Quantization Using Constellation Based Codebooks for Multiuser MIMO-OFDM

    Channel Quantization Using Constellation Based Codebooks for Multiuser MIMO-OFDM

    0 out of 5
    4,500

    Channel Quantization Using Constellation Based Codebooks for Multiuser MIMO-OFDM Abstract?Channel Quantization Using Constellation Based Codebooks for Multiuser MIMO-OFDM. In this paper, we propose clustered quantization techniques for multiuser multi-input/multi-output (MIMO) orthogonal frequency division multiplexing (OFDM) using constellation based codebooks. Constellation based codebooks provide scalability and efficient codeword search capability, < Final Year Projects > which…

  • CIDS-A framework for intrusion detection in cloud system

    CIDS-A framework for intrusion detection in cloud system

    0 out of 5
    4,500

    CIDS-A framework for intrusion detection in cloud system   Abstract? By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for “CIDS” a cloud based intrusion detection system, to solve the deficiencies of current IDSs.< Final Year Projects > CIDS also provides a component to summarize…

End of content

End of content