Showing 25–36 of 451 results

  • A Novel Method for Calculating Service Reputation

    0 out of 5
    4,500

    A Novel Method for Calculating Service Reputation Abstract? A Novel Method for Calculating Service Reputation. Owing to their rapid development, services are increasing rapidly in quantity. The consequence is that there are so many services that share the same or similar functions. Therefore, < Final Year Projects > it is important to select a credible…

  • A novel Method to access QA In EducationEnvironment

    0 out of 5
    4,500

    A novel Method to access QA In EducationEnvironment Abstract? A novel Method to access QA In EducationEnvironment. In this paper, a novel access method with LS-code in multicarrier code division multiple access (MC-CDMA) system is proposed, called MC-LS-CDMA scheme. The theoretical analysis and the simulation results show that by using the LS-code access method proposed…

  • A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud

    0 out of 5
    4,500

    A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud Abstract? Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data-intensive applications without infrastructure investment. Along the processing of such applications, a large volume of intermediate data sets will be generated,…

  • A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

    0 out of 5
    4,500

    A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing Abstract? As an effective and ef?cient way to provide computing resources and services to customers on demand, cloud computing has become more and more popular. From cloud service providers? perspective, pro?t is one of the most important considerations, and it is mainly determined…

  • A Review of Anomaly based Intrusion Detection Systems

    0 out of 5
    4,500

    A Review of Anomaly based Intrusion Detection Systems Abstract? With the advent of anomaly-based intrusion detection systems, many approaches and techniques have been developed to track novel attacks on the systems. High detection rate of 98% at a low alarm rate of 1% can be achieved by using these techniques. Though anomaly-based approaches are efficient,…

  • A robust method for data hiding using images

    0 out of 5
    4,500

    A robust method for data hiding using images Abstract?A robust method for data hiding using images. We propose, in this paper, a novel edge-adaptive data hiding method for authenticating binary host images. Through establishing a dense edge-adaptive grid (EAG) along the object contours, we use a simple binary image to show that EAG more efficiently…

  • A Scalable Server Architecture for Mobile Presence Services in Social Network Applications

    0 out of 5
    4,500

    A Scalable Server Architecture for Mobile Presence Services in Social Network Applications   Abstract? A Scalable Server Architecture for Mobile Presence Services in Social Network Applications. Social network applications are becoming increasingly popular on mobile devices. A mobile presence service is an essential component of a social network application because it maintains each mobile user’s…

  • A Single Switch High Step-Up DC-DC Converter

    0 out of 5
    4,500

    A Single Switch High Step-Up DC-DC Converter with Low and Steady Switch Voltage Stress Abstract-In this paper, a new high voltage gain step-up dc-dc converter is proposed for interfacing renewable power generation. The configuration optimally integrates both the coupled-inductor and switched-capacitor techniques to achieve an ultra-high step-up gain of voltage conversion with low voltage stress…

  • A Survey of Task Allocation and Load Balancing in Distributed Systems

    0 out of 5
    5,500

    A Survey of Task Allocation and Load Balancing in Distributed Systems Abstract? In past decades, significant attention has been devoted to the task allocation and load balancing in distributed systems. Although there have been some related surveys about this subject, each of which only made a very preliminary review on the state of art of…

  • A Survey on Taxonomy learning using Graph-based Approach

    0 out of 5
    4,500

    A Survey on Taxonomy learning using Graph-based Approach Abstract-Taxonomy learning is an important task for developing successful applications as well as knowledge obtaining, sharing and classification. The manual construction of the domain taxonomies is a time-consuming task. To reduce the time and human effort will build a new taxonomy learning approach named as TaxoFinder. TaxoFinder…

  • Placeholder

    A System to Filter Unwanted Messages from OSN User Walls

    0 out of 5
    4,500

    A System to Filter Unwanted Messages from OSN User Walls Abstract? One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide little support to this requirement. < Final...

  • A Time Ef?cient Approach for Detecting Errors in Big Sensor Data on Cloud

    0 out of 5
    4,500

    A Time Ef?cient Approach for Detecting Errors in Big Sensor Data on Cloud Abstract? A Time Ef?cient Approach for Detecting Errors in Big Sensor Data on Cloud. Big sensor data is prevalent in both industry and scienti?c research applications where the data is generated with high volume and velocity it is dif?cult to process using…

End of content

End of content