Showing 997–1008 of 1333 results

  • Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset

    0 out of 5
    4,500

    Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset Abstract– Clustering techniques have been widely adopted in many real world data analysis applications, such as customer behavior analysis, targeted marketing, digital forensics, etc. With the explosion of data in today?s big data era, a major trend to handle a clustering over large-scale datasets is outsourcing…

  • Pre-Charged Local Bit-Line Sharing SRAM Architecture for Near-Threshold Operation

    0 out of 5
    4,500

    Pre-Charged Local Bit-Line Sharing SRAM Architecture for Near-Threshold Operation Abstract– In the first place, a pre-charged local bit-line sharing (PCLBS) static random access memory (SRAM) for nearthreshold operation is proposed. In previous local bit-line sharing SRAMs, such as average-8T and full-swing local bit-line (FSLB) SRAMs, multiple bit-cells share a local bit-line pair with a small…

  • Precharge-Free, Low-Power Content-Addressable Memory

    0 out of 5
    5,500

    Precharge-Free, Low-Power Content-Addressable Memory Abstract?Content-addressable memory (CAM) is the hardware for parallel lookup/search. The parallel search scheme promises a high-speed search operation but at the cost of high power consumption. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution…

  • Prediction of Leaf Disease using Segmentation with Hierarchical Clustering

    0 out of 5
    5,500

    Prediction of Leaf Disease using Segmentation with Hierarchical Clustering Abstract?Abstract Agriculture play a vital role to development of economy of India. Farmers have difficulty to select suitable fruit and vegetable crop. Disease management by manually is a challenging task. Most of the diseases are seen on the leaves or stems of the plant. Hence agriculturist…

  • Predictive Big Data Analytics in Healthcare

    0 out of 5
    5,500

    Predictive Big Data Analytics in Healthcare Abstract?The massive set of data is generated from different organizations throughout the world. This huge and heterogeneous data is called Big Data. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme…

  • Predictive Data Mining for Medical Diagnosis : An Overview of Heart Disease Prediction

    0 out of 5
    4,500

    Predictive Dat a Mining for Medical Diagnosis : A n Overview of H eart Disease Prediction Abstract-The successful application of data mining in highly visible fields like e-business, marketing and retail has led to its application in other industries and sectors. Among these sectors just discovering is healthcare. The healthcare environment is still ?information rich?…

  • Preserving and Prolonging Students Information in College Using Android Application

    0 out of 5
    6,500

    Preserving and Prolonging Students Information in College Using Android Application Abstract? Student management system is to create an application that can provide query management system through android mobile phones. Student query management system android application tracks all the difficulties of a student from the day one to the end of his course which can be…

  • Primary User-aware Optimal Discovery Routing for Cognitive Radio Networks

    0 out of 5
    4,500

    Primary User-aware Optimal Discovery Routing for Cognitive Radio Networks Abstract-Routing protocols in multi-hop cognitive radio networks (CRNs) can be classified into two main categories: local and global routing. Local routing protocols aim at decreasing the overhead of the routing process while exploring the route by choosing, in a greedy manner, one of the direct neighbors….

  • Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense

    0 out of 5
    5,500

    Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense Abstract?Along with the popularity of mobile social networks (MSNs) is the increasing danger of privacy breaches due to user location exposures. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database…

  • Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites

    0 out of 5
    5,500

    Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Abstract?Abstract With the increasing volume of images users share through social sites, maintaining privacy has become a major problem,as demonstrated by a recent wave of publicized incidents where users inadvertently shared personal information. In light of these incidents, the need of tools to help users…

  • Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning

    0 out of 5
    5,500

    Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning Abstract?To improve the efficiency of big data feature learning, the paper proposes a privacy preserving deep computation model by offloading the expensive operations to the cloud. Privacy concerns become evident because there are a large number of private data by various applications in…

  • Privacy Preserving Rack-based Dynamic Workload Balancing for Hadoop MapReduce

    0 out of 5
    5,500

    Privacy Preserving Rack-based Dynamic Workload Balancing for Hadoop MapReduce Abstract?Hadoop has two components namely HDFS and MapReduce. Hadoop stores user data based on space utilization of datanodes on the cluster rather than the processing capability of the datanodes. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete…

End of content

End of content