Showing 1093–1104 of 1348 results

  • Robust module based Data Management System

    0 out of 5
    4,500

    Robust module based Data Management System   Abstract? The current trend for building an ontology-based data management system (DMS) is to capitalize on efforts made to design a preexisting well-established DMS (a reference system).< Final Year Project > The method amounts to extracting from the reference DMS a piece of schema relevant to the new…

  • Robust Perceptual Image Hashing Based on Ring Partition and NMF

    0 out of 5
    4,500

    Robust Perceptual Image Hashing Based on Ring Partition and NMF Abstract? Robust Perceptual Image Hashing Based on Ring Partition and NMF. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • RODS: Rarity based Outlier Detection in a Sparse Coding Framework

    0 out of 5
    4,500

    RODS: Rarity based Outlier Detection in a Sparse Coding Framework Abstract? RODS: Rarity based Outlier Detection in a Sparse Coding Framework. Outlier detection has been an active area of research for few decades. We propose a new definition of outlier useful for high-dimensional data. Given a dictionary of atoms learned using the sparse coding objective,…

  • Rollback Mechanisms for Cloud Management APIs using AI planning

    0 out of 5
    4,500

    Rollback Mechanisms for Cloud Management APIs using AI planning Abstract-Human-induced faults play a large role in systems reliability. In cloud platforms, system administrators may inadvertently make catastrophic mistakes, like deleting a virtual disk with important data. Providing rollback for cloud operations can reduce the severity and impact of such mistakes, by allowing to revert to…

  • Rotation Invariant Texture Retrieval Considering the Scale Dependence of Gabor Wavelet

    0 out of 5
    4,500

    Rotation Invariant Texture Retrieval Considering the Scale Dependence of Gabor Wavelet Abstract? Rotation Invariant Texture Retrieval Considering the Scale Dependence of Gabor Wavelet. Obtaining robust and ef?cient rotation-invariant texture features in content-based image retrieval ?eld is a challenging work. We propose three ef?cient rotation-invariant methods for texture image retrieval using copula model based in the…

  • RSk NN: k NN Search on Road Networks by Incorporating Social Influence

    0 out of 5
    4,500

    RSk NN: k NN Search on Road Networks by Incorporating Social Influence Abstract?RSk NN: k NN Search on Road Networks by Incorporating Social Influence.Although kNN search on a road network Gr, i.e., finding k nearest objects to a query user q on Gr, has been extensively studied, existing works neglected the fact that the q?s…

  • RSkNN: kNN Search on Road Networks by Incorporating Social Influence

    0 out of 5
    5,500

    Automatic Attendance Management System Using Face Recognition Abstract? Although kNN search on a road network Gr, i.e., finding k nearest objects to a query user q on Gr, has been extensively studied, existing works neglected the fact that the q?s social information can play an important role in this kNN query. Many real-world applications, such…

  • Run Time Application Repartitioning in Dynamic Mobile Cloud Environments

    0 out of 5
    5,500

    Run Time Application Repartitioning in Dynamic Mobile Cloud Environments Abstract?Abstract As mobile computing increasingly interacts with the cloud, a number of approaches, e.g., MAUI and CloneCloud, have been proposed, aiming to offload parts of the mobile application execution to the cloud. To achieve a good performance by using these approaches, they particularly focus on the…

  • S3K: Scalable Security With Symmetric Keys?DTLS Key Establishment for the Internet of Things

    0 out of 5
    5,500

    S3K: Scalable Security With Symmetric Keys?DTLS Key Establishment for the Internet of Things Abstract?Abstract DTLS is becoming the de facto standard for communication security in the Internet of Things (IoT). In order to run the DTLS protocol, one needs to establish keys between the communicating devices. The default method of key establishment requires X.509 certificates…

  • SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks

    0 out of 5
    4,500

    SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks Abstract? SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks. Social network analysis is used to extract features of human communities and proves to be very instrumental in a variety of scientific domains. The dataset of a social network is often so…

  • SafeStack: Automatically Patching Stack- Based Buffer Overflow Vulnerabilities

    0 out of 5
    4,500

    SafeStack: Automatically Patching Stack- Based Buffer Overflow Vulnerabilities Abstract? Buffer overflow attacks still pose a significant threat to the security and availability of today’s computer systems. Although there are a number of solutions proposed to provide adequate protection against buffer overflow attacks, most of existing solutions terminate the vulnerable program when the buffer overflow occurs,…

  • SanGA: A Self-Adaptive Network-Aware Approach to Service Composition

    0 out of 5
    4,500

    SanGA: A Self-Adaptive Network-Aware Approach to Service Composition Abstract?SanGA: A Self-Adaptive Network-Aware Approach to Service Composition. Service-Oriented Computing enables the composition of loosely coupled services provided with varying Quality of Service (QoS) levels. Selecting a near-optimal set of services for a composition in terms of QoS is crucial when many functionally equivalent services are available….

End of content

End of content