A Novel Cost-Based Model for Data Repairing Abstract? Integrity constraint based data repairing is an iterative process consisting of two parts: detect and group errors that violate given integrity constraints (ICs); and modify values inside each group such that the modified database satisfies those ICs. However, most existing automatic solutions treat the process of detecting…
A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers Abstract?A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers. This paper presents a novel economic model to regulate capacity sharing in a federation of hybrid cloud providers (CPs). The proposed work models the interactions among the CPs as a repeated…
A Novel Internet of Things-centric Framework to Mine Malicious Frequent Patterns Abstract– There are a number of research challenges associated with Internet of Things (IoT) security, and one of these challenges is to design novel frameworks to mine malicious frequent patterns for identifying misuse and detecting anomalies without incurring high computational costs (e.g. due to…
A novel model for credit card fraud detection using Artificial Immune Systems Abstract-The amount of online transactions is growing these days to a large number. A big portion of these transactions contains credit card transactions. The growth of online fraud, on the other hand, is notable, which is generally a result of ease of access…
A Novel Recommendation Model Regularized with User Trust and Item Ratings Abstract?We propose Trust SVD, a trust-based matrix factorization technique for recommendations. TrustSVD integrates multiple information sources into the recommendation model in order to reduce the data sparsity and cold start problems and their degradation of recommendation performance. < final year projects > [numbers_sections number=”1″…
A Novel Recommendation Model Regularized with User Trust and Item Ratings Abstract? A Novel Recommendation Model Regularized with User Trust and Item Ratings. TrustSVD, a trust-based matrix factorization technique for recommendations. TrustSVD integrates multiple information sources into the recommendation model in order to reduce the data sparsity and cold start problems and their degradation of…
A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem Abstract? A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…
A P2P-Botnet Detection Model and Algorithms Based on Network Streams Analysis Abstract?A P2P-Botnet Detection Model and Algorithms Based on Network Streams Analysis. Aimed at the situation that it is difficult to detect the peer-to-peer (P2P) botnet, < Final Year Projects > we provide a new method for detection based on the analysis network streams. Firstly,…
A Pareto-based Genetic Algorithm for Optimized Assignment of VM Requests on a Cloud Brokering Environment Abstract– In the first place, deal with cloud brokering for the assignment optimization of VM requests in three-tier cloud infrastructures. We investigate the Pareto-based meta-heuristic approach to take into account multiple client and broker centric optimization criteria. We propose a…
A Personalized Web Search Based on User Profile and User Clicks Abstract? A Personalized Web Search Based on User Profile and User Clicks. Generally web search engines are built to serve all users, independent of the individual needs of any user. Personalization of web search is to carry out retrieval for each user incorporating their…
A Pre-Authentication Approach to Proxy Re-encryption in Big Data Context Abstract-In the first place,Big Data growing amount of data, the demand of big data storage significantly increases. Through the cloud center, data providers can conveniently share data stored in the center with others. However, one practically important problem in big data storage is privacy Cloud…
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud Abstract? A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database…