Showing 433–444 of 451 results

  • Travel & Tourism

    0 out of 5
    3,500

    Travel & Tourism Abstract?Travel & Tourism. With the advent of Leisure Economy Times and the popularization of cars, besides being used for daily commute and business travel, private cars are playing an important role in recreational activities on weekends and holidays which is called urban self-driving tourism in China. To understand the behavioral characteristics of…

  • Trust and Compactness in Social Network Groups

    0 out of 5
    4,500

    Trust and Compactness in Social Network Groups Abstract? Trust and Compactness in Social Network Groups. Understanding the dynamics behind group formation and evolution in social networks is considered an instrumental milestone to better describe how individuals gather and form communities, how < Final Year Projects 2016 > enjoy and share the platform contents, how they…

  • Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

    0 out of 5
    4,500

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Abstract? Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage. Cloud data storage has provided signi?cant bene?ts by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud,…

  • Trustworthy Parking Communities: Helping Your Neighbor to Find a Space

    0 out of 5
    5,500

    Trustworthy Parking Communities: Helping Your Neighbor to Find a Spaces Abstract?Abstract Cooperation between vehicles facilitates traffic management, road safety and infotainment applications. Cooperation,however, requires trust in the validity of the received information. In this paper, we tackle the challenge of securely exchanging parking spot availability information. Trust is crucial in order to support the decision…

  • Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds

    0 out of 5
    4,500

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Abstract? Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds. A major challenging problem for cloud providers is designing ef?cient mechanisms for virtual machine < Final Year Projects 2016 > VM provisioning and allocation. Such mechanisms enable the cloud providers…

  • Placeholder

    TW-k-Means: Automated Two-Level Variable Weighting Clustering Algorithm for Multiview Data

    0 out of 5
    4,500

    TW-k-Means: Automated Two-Level Variable Weighting Clustering Algorithm for Multiview Data Abstract? TW-k-Means: Automated Two-Level Variable Weighting Clustering Algorithm for Multiview Data. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • User-Centric Similarity Search

    0 out of 5
    4,500

    User-Centric Similarity Search Abstract-User preferences play a significant role in market analysis. In the database literature, there has been extensive work on query primitives, such as the well known top- k query that can be used for the ranking of products based on the preferences customers have expressed. Still, the fundamental operation that evaluates the…

  • Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization

    0 out of 5
    5,500

    Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization Abstract? Online social networks have gained significant popularity recently. The problem of influence maximization in online social networks has been extensively studied. However, in prior works, influence propagation in the physical world, which is also an indispensable factor, is not considered. The Location-Based Social…

  • Using Crowdsourcing to Provide QoS for Mobile Cloud Computing

    0 out of 5
    5,500

    Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Abstract? Quality of cloud service (QoS) is one of the crucial factors for the success of cloud providers in mobile cloud computing. Context-awareness is a popular method for automatic awareness of the mobile environment and choosing the most suitable cloud provider. Lack of context information may…

  • Using Facebook for Image Steganography

    0 out of 5
    4,500

    Using Facebook for Image Steganography Abstract? Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held devices running iOS, Android, or Windows Phone), it would…

  • VANET-Based Secure and Privacy-Preserving Navigation

    0 out of 5
    4,500

    VANET-Based Secure and Privacy-Preserving Navigation Abstract? VANET-Based Secure and Privacy-Preserving Navigation. In this paper, we propose a navigation scheme that utilizes the online road information collected by a vehicular ad hoc network (VANET) to guide the drivers to desired destinations in a real-time and distributed manner. The proposed scheme has the advantage of using real-time…

  • VEGAS: Visual influEnce GrAph Summarization on Citation Networks

    0 out of 5
    4,500

    VEGAS: Visual influEnce GrAph Summarization on Citation Networks Abstract? VEGAS: Visual influEnce GrAph Summarization on Citation Networks. Visually analyzing citation networks poses challenges to many fields of the data mining research. How can we summarize a large citation graph according to the user?s interest? In particular, how can we illustrate the impact of a highly…

End of content

End of content