Showing 1225–1236 of 1348 results

  • Steganography Using Reversible Texture Synthesis

    0 out of 5
    4,500

    Steganography Using Reversible Texture Synthesis Abstract?Steganography Using Reversible Texture Synthesis. A novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image,which synthesizes a new texture image with a similar local appearance and an arbitrary size. We weave the texture synthesis process into steganography to conceal secret messages….

  • Structural Vulnerability Assessment of Community-based Routing in Opportunistic Networks

    0 out of 5
    5,500

    Structural Vulnerability Assessment of Community-based Routing in Opportunistic Networks Abstract?Opportunistic networks enable mobile devices to communicate with each other through routes that are built dynamically, while messages are en route between the sender and the destination(s). The social structure and interaction of users of such devices dictate the performance of routing protocols in those networks….

  • Student data mining solution?knowledge management system related to higher education institutions

    0 out of 5
    3,500

    Student data mining solution?knowledge management system related to higher education institutions Abstract?Higher education institutions (HEIs) are often curious whether students will be successful or not during their study. Before or during their courses the academic institutions try to estimate the percentage of successful students. But is it possible to predict the success rate of students…

  • Student Performance Analysis

    0 out of 5
    4,500

    Student Performance Analysis Abstract?Student Performance Analysis. A good Automating Student Performance Analysis system will automate user?s activities, processes and practices, as well as increase their ability to handle a greater capacity of events. This is an efficient Automating Student Performance Analysis system software project that serves the functionality of an event manager. The event manager…

  • Supervised and Unsupervised Aspect Category Detection for Sentiment Analysis With Co-Occurrence Data

    0 out of 5
    4,500

    iShuffle: Improving Hadoop Performance with Shuffle-on-Write Abstract– Using online consumer reviews as electronic word of mouth to assist purchase-decision making has become increasingly popular. The Web provides an extensive source of consumer reviews, but one can hardly read all reviews to obtain a fair evaluation of a product or service. A text processing framework that…

  • Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings

    0 out of 5
    4,500

    Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings Abstract? Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Base Paper Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video…

  • Supporting multi data stores applications in cloud environments

    0 out of 5
    5,500

    Supporting multi data stores applications in cloud environments Abstract? The production of huge amount of data and the emergence of cloud computing have introduced new requirements for data management. Many applications need to interact with several heterogeneous data stores depending on the type of data they have to manage: traditional data types, documents, graph data…

  • Supporting Privacy Protection in personalized web search

    0 out of 5
    4,500

    Supporting Privacy Protection in personalized web search Abstract? Supporting Privacy Protection in personalized web search. Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide…

  • Supporting Search-As-You-Type Using SQL in Databases

    0 out of 5
    4,500

    Supporting Search-As-You-Type Using SQL in Databases   Abstract? Supporting Search-As-You-Type Using SQL in Databases. A search-as-you-type system computes answers on-the-fly as a user types in a keyword query character by character. We study how to support search-as-you-type on data residing in a relational DBMS. We focus on how to support this type of search using…

  • Survey on classification and detection of plant leaf disease in agriculture environment

    0 out of 5
    4,500

    Survey on classification and detection of plant leaf disease in agriculture environment Abstract– Agriculture is the cultivation and breeding of animals, plants and fungi for food, fibre, biofuel, medicinal plants and other products used to sustain and enhance human life. Agriculture is the backbone of India. But here we analysing plant disease prediction and classification…

  • SVM-based Web Content Mining with Leaf Classification Unit from DOM-tree

    0 out of 5
    4,500

    SVM-based Web Content Mining with Leaf Classification Unit from DOM-tree Abstract-In order to analyze a news article dataset, we first extract important information such as title, date, and paragraph of the body. At the same time, we remove unnecessary information such as image, caption, footer, advertisement, navigation and recommended news. The problem is that the…

  • SWIPER: EXPLOITING VIRTUAL MACHINE VULNERABILITY IN THIRD-PARTY CLOUDS WITH COMPETITION FOR I/O RESOURCES

    0 out of 5
    4,500

    SWIPER: EXPLOITING VIRTUAL MACHINE VULNERABILITY IN THIRD-PARTY CLOUDS WITH COMPETITION FOR I/O RESOURCES Abstract?SWIPER: EXPLOITING VIRTUAL MACHINE VULNERABILITY IN THIRD-PARTY CLOUDS WITH COMPETITION FOR I/O RESOURCES. The emerging paradigm of cloud computing, e.g., Amazon Elastic Compute Cloud (EC2), promises a highly flexible yet robust environment for large-scale applications. Ideally, while multiple virtual machines (VM) share…

End of content

End of content