Sequence-Growth : A Scalable and Effective Frequent Itemset Mining Algorithm for Big Data Based on MapReduce Framework Abstract? Frequent itemset mining FIM < Final Year Projects 2016 > is an important research topic because it is widely applied in real world to ?nd the frequent itemsets and to mine human behavior patterns. FIM process is…
Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds Abstract?A service operator-aware trust scheme SOTS for resource matchmaking across < Final Year Projects 2016 > multiple clouds. Through analyzing the built-in relationship between the users, the broker, and the service resources, this paper proposes a middleware framework of trust management that can effectively reduces…
Service-generated Big Data and Big Data-as-a-Service: An Overview Abstract?The prevalence of service computing and cloud computing, more and more services are emerging on the Internet, generating huge volume of data, such as trace logs, QoS information, service relationship, etc. The overwhelming service-generated data become too large and complex difficult < Final Year Projects 2016 >…
Set predicates in sql:Enabling set-level comparisons for dynamically formed groups Abstract?Set predicates in sql:Enabling set-level comparisons for dynamically formed groups. In data warehousing and OLAP applications, scalar-level predicates in SQL become increasingly inadequate to support a class of operations that require set-level comparison semantics, i.e., comparing a group of tuples with multiple values. Currently, complex…
Shape Similarity Analysis by Self-Tuning Locally Constrained Mixed-Diffusion Abstract?Similarity analysis is a powerful tool for shape matching/retrieval and other computer vision tasks. In the literature, various shape (dis)similarity measures have been introduced. Different measures specialize on different aspects of the data. < Final Year Projects > In this paper, we consider the problem of…
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Abstract? Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. Cloud computing is an emerging data interactive paradigm to realize users? data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the…
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Abstract? Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. Cloud computing is an emerging data interactive paradigm to realize users? data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the…
Sharing of Patient confidential data using ECG steganography Abstract?Sharing of Patient confidential data using ECG steganography. The number of aging population are growing significantly. In accordance with Health Insurance Portability and Accountability Act (HIPAA) the patient’s privacy and security is important in the protection of healthcare privacy. Point-Of-care (PoC) is an application used in hospitals…
Signature Seraching in a Networked Collection of files Abstract?Signature Seraching in a Networked Collection of files. A signature is a data pattern of interest in a large data file or set of large data files. Such signatures that need to be found arise in applications such as DNA sequence analysis, network intrusion detection, biometrics, <...
Similarity Measure Selection for Clustering Time Series Databases Abstract? Similarity Measure Selection for Clustering Time. Series Databases Clustering has become a popular task associated with time series. The choice of a suitable distance measure is crucial to the clustering process and, given the vast number of distance measures for time series available in the literature…
Simpler, Faster, More Accurate Melanocytic Lesion Segmentation Through MEDS Abstract?Simpler, Faster, More Accurate Melanocytic Lesion Segmentation Through MEDS. We present a new technique for melanocytic lesion < Final Year Projects > segmentation, Mimicking Expert Dermatologists’ Segmentations (MEDS), and extensive tests of its accuracy, speed, and robustness. MEDS combines a thresholding scheme reproducing the cognitive process…