Time saving protocol for data accessing in cloud computing Abstract-Cloud computing is a very trending technology because of its efficiency, cost effectiveness, pay-per-use, flexibility and scalability. Data security and access control are two significant issues experienced while availing these advantages of cloud computing. Access control can be defined as a procedure by which a user…
Time Series Database Preprocessing for Data Mining Using Python Abstract-Database Preprocessing for Data Mining Using Python lays the groundwork for data mining. Before the discovery of useful information/knowledge, the target data set must be properly prepared. Using Data Mining in census data has very high learning value and vast marketplace space. While census data are…
Time Series Shapelets: A New Primitive for Data Mining Abstract? Time Series Shapelets: A New Primitive for Data Mining. Classification of time series has been attracting great interest over the past decade. Recent empirical evidence has strongly suggested that the simple nearest neighbor algorithm is very difficult to beat for most time series problems. While…
Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds Abstract? Running sophisticated software on smart phones could result in poor performance and shortened battery lifetime because of their limited resources. Recently, of?oading computation workload to the cloud has become a promising solution to enhance both performance and battery life of smart phones. However, it…
Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach Abstract? With the ever-increasing demands on multimedia applications, cloud computing, due to its economical but powerful resources, is becoming a natural platform to process, store, and share multimedia contents. However, the employment of cloud computing also brings new security and privacy issues as…
Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles Abstract? Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles. Recently, two ideas have been explored that lead to more accurate algorithms for time-series classi?cation < Final Year Projects 2016 > TSC. First, it has been shown that the simplest way to gain improvement on TSC…
Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management Abstract? Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management. Distributed mobility management DMM is a promising technology to address the mobile data traf?c explosion problem. Since the location information of mobile < Final Year Project 2016 > nodes (MNs)…
Timing Error Tolerance in Small Core Designs for SoC Applications Abstract? Timing errors are an increasing reliability concern in nanometer technology, high complexity and multi-voltage/frequency integrated circuits. A local error detection and correction technique is presented in this work that is based on a new bit flipping flip-flop. Whenever a timing error is detected, it…
To improve Blood Donation Process using Data Mining Techniques Abstract? To improve Blood Donation Process using Data Mining Techniques. Blood is the vital thing for human being because there is no alternative for replacing it. This makes it necessary for the presence of a system for predicting continuous behavior of healthy blood donors in blood…
To Increase the Data Confidentiality under Exposing of Secret Keys with revocable Access Abstract– In the first place, describe a new novel cryptography approaches based key management with data storage on cloud server.Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the attacker?s access to the cipher…
To Lie or t o Comply: Defending against FloodAttacks in Disruption Tolerant Networks Abstract? To Lie or t o Comply: Defending against FloodAttacks in Disruption Tolerant Networks. For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search…
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model Abstract? To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…