Social Collaborative Filtering by Trust Abstract? Recommender systems are used to accurately and actively provide users with potentially interesting information or services. Collaborative filtering is a widely adopted approach to recommendation, but sparse data and cold-start users are often barriers to providing high quality recommendations. To address such issues, we propose a novel method that…
Social Media Analysis using Optimized K-Means Clustering Abstract?The increasing influence of social media and enormous participation of users creates new opportunities to study human social behavior along with the capability to analyze large amount of data streams. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation…
Social Network Analysis Using Big Data Abstract? The increasing use of social networks, such as Facebook, Twitter, and Weibo, has produced and is producing huge volume of data. Business firms and other organizations are interested in discovering new business insight to increase business performance. By using advanced analytics, enterprises can analyze big data to learn…
Social-Aware Video Multicast Based on Device-to-Device Communications Abstract? To meet the explosive demand on delivering high-definition video steams over cellular networks, we design a Social-aware video multiCast (SoCast) system leveraging device-to-device (D2D) communications. One salient feature of SoCast is to stimulate effective cooperation among mobile users (clients), by making use of two types of important…
Soft Biometrics: Globally Coherent Solutions for Hair Segmentation and Style Recognition based on Hierarchical MRFs Abstract– Markov Random Fields (MRFs) are a popular tool in many computer vision problems and faithfully model a broad range of local dependencies. However, rooted in the Hammersley-Clifford theorem, they face serious difficulties in enforcing the global coherence of the…
Software piracy protection Abstract? Software piracy has been major issue for software industries. They have to pay a very large amount to protect their applications. There are several insurance schemes for the protection of software. But they all are very costly and provide services for a limited period of time. This paper will demonstrate a…
Source-level Energy Consumption Estimation for Cloud Computing Tasks Abstract– In the first place, order checking between delivery boy and the customer. If the customer order some goods in a particular company/ industry means, the order information such as customer name, address, amount, number of items to be purchased details will be sent to both customer…
Optimizing Cloud-Service Performance: Efficient Resource Provisioning via Optimal Workload Allocation Abstract-Cloud computing is being widely accepted and utilized in the business world. From the perspective of businesses utilizing the cloud, it is critical to meet their customers? requirements by achieving service-level-objectives. Hence, the ability to accurately characterize and optimize cloud-service performance is of great importance….
Space Codes for MIMO Optical Wireless Communications: Error Performance Criterion and Code Construction Abstract– In the first place, consider a multiple-input-multipleoutput optical wireless communication (MIMO-OWC) system in the presence of log-normal fading. In this scenario, a general criterion for the design of full-diversity space code (FDSC) with the maximum likelihood detector is developed. This criterion…
Space?Time Network Coding With Antenna Selection Abstract? we investigate the space?time network coding (STNC) with antenna selection (AS) in the cooperative multiple-input?multiple-output (MIMO) network, where U users communicate with a common destination D with the aid of R decode-and-forward (DF) relays. In this network, the best transmit/receive antenna pair with the highest signal-to-noise (SNR) ratio…
Sparsity-Aware Affine Projection Adaptive Algorithms for System Identification Abstract-In the first place, propose adaptive algorithms for system identification of sparse systems. We introduce a L1- norm penalty to improve the performance of affine projection algorithms. This strategy results in two new algorithms, the zeroattracting APA (ZA-APA) and the reweighted zero-attracting AP (RZA-APA). The ZA-APA is…
Spectrally Precoded OFDM Without Guard Insertion Abstract? Orthogonal frequency-division multiplexing (OFDM) signaling format is commonly associated with guard subintervals to reject interblock interference (IBI) and enable simple onetap frequency-domain equalization (FDE) at the receiver when received over dispersive channels. Despite the advantages, the insertion of guard subintervals expands the signal spectrum and thus trades off…