The Adaptive Clustering Method for the Long Tail Problem of Recommender Systems Abstract? the long tail problem of recommender systems when many items in the long tail have only a few ratings, thus making it hard to use them in recommender systems. < Final Year Project >The approach presented in this paper clusters items according…
The Integrated Surface Drought Index (ISDI) as an Indicator for Agricultural Drought Monitoring: Theory, Validation, and Application in Abstract?Based on the concept of the new drought index called Vegetation Drought Response Index (VegDRI) using data-mining technology, an Integrated Surface Drought Index (ISDI) was established in this study. ISDI improved the original model, adding remote sensed…
The Move-Split-Merge Metric for Time Series Abstract?The Move-Split-Merge Metric for Time Series.A novel metric for time series, called Move-Split-Merge (MSM), is proposed. This metric uses as building blocks three fundamental operations: Move, Split, and Merge, which can be applied in sequence to transform any time series into any other time series. A Move operation…
The Role Of Hubness For Clustering High Dimensional Data Abstract?The Role Of Hubness For Clustering High Dimensional Data. High-dimensional data arise naturally in many domains, and have regularly presented a great < Final Year Projects > challenge for traditional data mining techniques, both in terms of effectiveness and efficiency. Clustering becomes difficult due to the…
The Small World of File Sharing. Web caches, content distribution networks, peer-to-peer file-sharing networks, distributed file systems, and data grids all have in common that they involve a community of users who use shared data. In each case, overall system performance can be improved significantly by first identifying and then exploiting the structure of community’s…
The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks Abstract? The problem of user cost minimization in mobile cloud computing (MCC) networks. We consider a MCC model where multiple brokers assign cloud resources to mobile users. The model is characterized by an heterogeneous cloud architecture (which includes a public cloud and…
The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks Abstract? The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks. The problem of user cost minimization in mobile cloud computing (MCC) networks. We consider a MCC model where multiple brokers assign cloud resources to mobile users. The model…
Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers Abstract?Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers. Decreasing the soaring energy cost is imperative < Final Year Projects > in large data centers. Meanwhile, limited computational resources need to be fairly allocated among different organizations. Latency is another major concern for resource…
Time saving protocol for data accessing in cloud computing Abstract-Cloud computing is a very trending technology because of its efficiency, cost effectiveness, pay-per-use, flexibility and scalability. Data security and access control are two significant issues experienced while availing these advantages of cloud computing. Access control can be defined as a procedure by which a user…
Time Series Shapelets: A New Primitive for Data Mining Abstract? Time Series Shapelets: A New Primitive for Data Mining. Classification of time series has been attracting great interest over the past decade. Recent empirical evidence has strongly suggested that the simple nearest neighbor algorithm is very difficult to beat for most time series problems. While…
Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach Abstract? With the ever-increasing demands on multimedia applications, cloud computing, due to its economical but powerful resources, is becoming a natural platform to process, store, and share multimedia contents. However, the employment of cloud computing also brings new security and privacy issues as…
To Increase the Data Confidentiality under Exposing of Secret Keys with revocable Access Abstract– In the first place, describe a new novel cryptography approaches based key management with data storage on cloud server.Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the attacker?s access to the cipher…