Vehicle Management System Abstract? Abstract: Vehicle Management System can be defineds ‘learning facilitated and supported through the use of information and communications technology’. It can cover a spectrum of activities from the use of technology to support learning as part of a ?blended? approach (a combination of traditional and Vehicle Management System approaches),to learning that…
Virtual Servers Co-Migration for Mobile Accesses: Online vs. Off-line Abstract?Virtual Servers Co-Migration for Mobile Accesses Online vs. Off-line .Firstly we study the problem of co-migrating a set of service replicas residing on one or more redundant virtual servers in clouds in order to satisfy a sequence of mobile batch-request emands in a cost effective way….
Visualizing Rank Time Series of Wikipedia Top-Viewed Pages Abstract– Large rank time series datasets have alwaysposed a challenge for data analysts. In addition to the time-varying property, each itemat every time point can be a complex object that has multivariate properties, relation properties, or both. In this article, we study rank time series to explore…
Web usage mining to improve the design of an e-commerce website Abstract? Web usage mining to improve the design of an e-commerce website. In a short span of time, less than 10 years, E-Commerce industry has observed a magnificent growth in some of the developed countries. However E-Commerce industry in developing countries like India is…
Weighted Data Gravitation Classification for Standard and Imba Abstract?Weighted Data Gravitation Classification for Standard and Imba. Gravitation is a fundamental interaction whose concept and effects applied to data classification become a novel data classification technique. The simple principle of data gravitation classification (DGC) is to classify data samples by comparing the gravitation between different classes….
Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks Abstract-Today search engines are tightly coupled with social networks, and present users with a double-edged sword: they are able to acquire information interesting to users but are also capable of spreading viruses introduced by hackers. It is challenging to characterize how a…