Showing 337–348 of 1331 results

  • Click and Session Based – Captcha as Graphical Password Authentication Schemes for Smart Phone and Web

    0 out of 5
    5,500

    Click and Session Based – Captcha as Graphical Password Authentication Schemes for Smart Phone and Web Abstract? When we consider the online service or desktop application there is major issue of security breaching. Old password schemes has some drawbacks like hacking of password, shoulder-surfing attack as far as password is concern, online password guessing attack,…

  • CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing

    0 out of 5
    4,500

    CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing Abstract– Mobile device and its applications have revolutionized the way store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper, we propose a…

  • Cloud Infrastructure Resource Allocation for Big Data Applications

    0 out of 5
    5,500

    Cloud Infrastructure Resource Allocation for Big Data Applications Abstract?Increasing popular big data applications bring about invaluable information, but along with challenges to industrial community and academia. Cloud computing with unlimited resources seems to be the way out. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation…

  • Cloud Service Reliability Enhancement via Virtual Machine Placement Optimization

    0 out of 5
    5,500

    Cloud Service Reliability Enhancement via Virtual Machine Placement Optimization Abstract?With rapid adoption of the cloud computing model, many enterprises have begun deploying cloud-based services. Failures of virtual machines (VMs) in clouds have caused serious quality assurance issues for those services. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete…

  • CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework

    0 out of 5
    5,500

    CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework Abstract? Explosive growth in the number of passwords for web based applications and encryption keys for outsourced data storage well exceeds the management limit of users. Therefore, outsourcing keys (including passwords and data encryption keys) to professional password managers (honest-but-curious service providers) is attracting the attention…

  • Cluster-Aware Virtual Machine Collaborative Migration in Media Cloud

    0 out of 5
    4,500

    Cluster-Aware Virtual Machine Collaborative Migration in Media Cloud Abstract Media cloud has become a promising paradigm for deploying large-scale streaming media applications at a reduced cost. Due to dynamic and diverse demands of users, media cloud presents two crucial characteristics: high resource consumption and dynamic traffic among media servers. Consequently, Virtual Machine (VM) migration in…

  • Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With Obstacles

    0 out of 5
    5,500

    Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With Obstacles Abstract? In wireless sensor networks (WSNs), the benefits of exploiting the sink mobility to prolong network lifetime have been well recognized. In physical environments, all kinds of obstacles could exit in the sensing field. Therefore, a research challenge is how to efficiently dispatch…

  • Clustering Data Streams Based on Shared Density between Micro-Clusters

    0 out of 5
    5,500

    Clustering Data Streams Based on Shared Density between Micro-Clusters Abstract? Clustering data streams has become an important technique for data and knowledge engineering. A typical approach is to summarize the data stream in real-time with an online process into a large number of so called micro-clusters. Micro-clusters represent local density estimates by aggregating the information…

  • Clustering Data Streams Based on Shared Density between Micro-Clusters

    0 out of 5
    5,500

    Clustering Data Streams Based on Shared Density between Micro-Clusters Abstract? As more and more applications produce streaming data, clustering data streams has become an important technique for data and knowledge engineering. A typical approach is to summarize the data stream in real-time with an online process into a large number of so called micro-clusters. Micro-clusters…

  • CMCS: Current-Mode Clock Synthesis

    0 out of 5
    5,500

    CMCS: Current-Mode Clock Synthesis Abstract? In a high-performance VLSI design, the clock network consumes a significant amount of power. While most existing methodologies use voltage-mode (VM) signaling, these clock distributions lose a tremendous amount of dynamic power to charge/discharge the large global clock capacitance. New circuit approaches for current-mode (CM) clocking save significant clock power,…

  • CMOS Integrated Time-Mode Temperature Sensor for Self-Refresh Control in DRAM Memory Cell

    0 out of 5
    5,500

    Compact Conformal Map for Greedy Routing in Wireless Mobile Sensor Networks Abstract? a low-power complementary metal?oxide?semiconductor (CMOS) smart temperature sensor in order to obtain self-refresh control for low-power memory cells. The multiple-block system is composed of a temperatureto- pulse generator (TPG), a time-to-digital converter (TDC), and a frequency selector. A pulse-shrinking system with an inverter-based…

  • Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model

    0 out of 5
    5,500

    Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model Abstract?Abstract Mining opinion targets and opinion words from online reviews are important tasks for fine-grained opinion mining, the key component of which involves detecting opinion relations among words. To this end, this paper proposes a novel approach based on the…

End of content

End of content