Showing 313–324 of 3682 results

  • A Review of Anomaly based Intrusion Detection Systems

    A Review of Anomaly based Intrusion Detection Systems

    0 out of 5
    4,500

    A Review of Anomaly based Intrusion Detection Systems Abstract? With the advent of anomaly-based intrusion detection systems, many approaches and techniques have been developed to track novel attacks on the systems. High detection rate of 98% at a low alarm rate of 1% can be achieved by using these techniques. Though anomaly-based approaches are efficient,…

  • A Review on Mining Students? Data for  Performance Prediction

    A Review on Mining Students? Data for Performance Prediction

    0 out of 5
    5,500

    A Review on Mining Students? Data for Performance Prediction Abstract? A country?s growth is strongly measured by the quality of its education system. Education sector has witnessed sea change in its functioning. Today it is recognized as an industry and as an industry it is facing challenges. The challenges of higher education being decrease in…

  • A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds

    A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds

    0 out of 5
    4,500

    A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds Abstract?A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds.Cloud computing is emerging as a new computing paradigm in the healthcare sector besides other business domains. Large numbers of health organizations have started shifting the electronic health information to the cloud environment. Introducing…

  • A Review Paper on Currency Recognition System

    A Review Paper on Currency Recognition System

    0 out of 5
    4,500

    A Review Paper on Currency Recognition System Abstract-In this paper, an algorithm based on the frequency domain feature extraction method is discussed for the detection of currency. This method efficiently utilizes the local spatial features in a currency image to recognize it. The entire system is pre-processed for the optimal and efficient implementation of two…

  • A Review Paper on Dengue Disease Forcasting Using Data Mining Techniques

    A Review Paper on Dengue Disease Forcasting Using Data Mining Techniques

    0 out of 5
    4,500

    A Review Paper on Dengue Disease Forcasting Using Data Mining Techniques Abstract-Data Mining is a standout amongst the most comprehensively and rousing zones of research with the motivation behind discovering significant information from vast data collections In Medical ventures, Data Mining gives many points of interest, for example, the location of the extortion in medical…

  • A Robust and Efficient Approach to License Plate Detection

    A Robust and Efficient Approach to License Plate Detection

    0 out of 5
    4,500

    A Robust and Efficient Approach to License Plate Detection Abstract-This paper presents a robust and efficient method for license plate detection with the purpose of accurately localizing vehicle license plates from complex scenes in real time. A simple yet effective image downscaling method is first proposed to substantially accelerate license plate localization without sacrificing detection…

  • A robust method for data hiding using images

    A robust method for data hiding using images

    0 out of 5
    4,500

    A robust method for data hiding using images Abstract?A robust method for data hiding using images. We propose, in this paper, a novel edge-adaptive data hiding method for authenticating binary host images. Through establishing a dense edge-adaptive grid (EAG) along the object contours, we use a simple binary image to show that EAG more efficiently…

  • A robust reputation management mechanism in the federated cloud

    A robust reputation management mechanism in the federated cloud

    0 out of 5
    4,500

    A robust reputation management mechanism in the federated cloud Abstract-In the Infrastructure as a Service (IaaS) paradigm of cloud computing, computational resources are available for rent.Although it offers a cost efficient solution to virtual network requirements, low trust on the rented computational resources prevents users from using it. To reduce the cost, computational resources are…

  • A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments

    A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments

    0 out of 5
    4,500

    A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments Abstract?Approximations of a concept by a variable precision rough-set model (VPRS) usually vary under a dynamic information system environment. It is thus effective to carry out incremental updating approximations by utilizing previous data structures.< Final Year Project > This paper focuses on a new…

  • A Scalable and Modular Architecture for High-Performance Packet Classification

    A Scalable and Modular Architecture for High-Performance Packet Classification

    0 out of 5
    4,500

    A Scalable and Modular Architecture for High-Performance Packet Classification Abstract? A Scalable and Modular Architecture for High-Performance Packet Classification. Packet classification is widely used as a core function for various applications in network infrastructure. With increasing demands in throughput, performing wire-speed packet classification has become challenging. Also the performance of today’s packet classification solutions depends…

  • A Scalable Server Architecture for Mobile Presence Services in Social Network Applications

    A Scalable Server Architecture for Mobile Presence Services in Social Network Applications

    0 out of 5
    4,500

    A Scalable Server Architecture for Mobile Presence Services in Social Network Applications   Abstract? A Scalable Server Architecture for Mobile Presence Services in Social Network Applications. Social network applications are becoming increasingly popular on mobile devices. A mobile presence service is an essential component of a social network application because it maintains each mobile user’s…

  • A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization using MapReduce on Cloud

    A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization using MapReduce on Cloud

    0 out of 5
    4,500

    A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization using MapReduce on Cloud Abstract? A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization using MapReduce on Cloud. A large number of cloud services require users to share private data like electronic health records for data analysis or mining, bringing privacy concerns. Anonymizing data sets via…

End of content

End of content