Showing 1873–1884 of 1941 results

  • Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds

    0 out of 5
    4,500

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Abstract? Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds. A major challenging problem for cloud providers is designing ef?cient mechanisms for virtual machine < Final Year Projects 2016 > VM provisioning and allocation. Such mechanisms enable the cloud providers…

  • Placeholder

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds

    0 out of 5
    4,500

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Abstract? A major challenging problem for cloud providers is designing efficient mechanisms for virtual machine (VM) provisioning and allocation. Such mechanisms enable the cloud providers to effectively utilize their available resources and obtain higher profits. Recently, cloud providers have introduced auction-based models for…

  • TruXy: Trusted Storage Cloud for Scientific Workflows

    0 out of 5
    4,500

    TruXy: Trusted Storage Cloud for Scientific Workflows Abstract? TruXy: Trusted Storage Cloud for Scientific Workflows. A wide array of Clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and tools such as < Final Year Projects 2016 > Taverna and Galaxy to model the execution of…

  • Placeholder

    Twitter data analysis by means of Strong FlippingGeneralized Itemsets

    0 out of 5
    4,500

    Twitter data analysis by means of Strong FlippingGeneralized Itemsets Abstract?Social Network Services (SNS) like Facebook, Twitter, Sina Weibo etc. are widely used all over the world today. People use them to keep in touch with friends and make new friends online. In China, Sina Weibo is one of the most successful social network service and…

  • Placeholder

    Two cooperative ant colonies for feature selection using fuzzy models

    0 out of 5
    4,500

    Two cooperative ant colonies for feature selection using fuzzy models Abstract? The available set of potential features in real-world databases is sometimes very large,< Final Year Projects > and it can be necessary to find a small subset for classification purposes. One of the most important techniques in data pre-processing for classification is feature selection….

  • Typicality-Based Collaborative Filtering Recommendation

    0 out of 5
    4,500

    Typicality-Based Collaborative Filtering Recommendation Abstract? Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy, and big-error in predictions. We borrow ideas of object typicality from cognitive psychology and propose a novel typicality-based collaborative filtering recommendation method named TyCo. A…

  • Placeholder

    Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services

    0 out of 5
    4,500

    Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services Abstract?Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services.The rapid development of Internet of things (IoT) technology makes it possible for connecting various smart objects together through the Internet and providing more data interoperability methods for application purpose. Recent research…

  • ubiSOAP A Service Oriented Middleware for Ubiquitous Networking.

    0 out of 5
    4,500

    ubiSOAP A Service Oriented Middleware for Ubiquitous Networking. Abstract? The computing and networking capacities of today’s wireless portable devices allow for ubiquitous services, which are seamlessly networked. Indeed, wireless handheld devices now embed the necessary resources to act as both service clients and providers.< Final Year Projects > However, the ubiquitous networking of services remains…

  • Ultralow-Voltage High-Speed Flash ADC Design Strategy Based on FoM-Delay Product

    0 out of 5
    4,500

    Ultralow-Voltage High-Speed Flash ADC Design Strategy Based on FoM-Delay Product Abstract? The ultralow-voltage (ULV) design strategy for high-speed flash analog-to-digital converters (ADCs). A lower supply voltage decreases the energy consumption at the cost of conversion speed. A new index, the figure-of-merit (FoM)-delay (FD) product, is introduced to provide a balance between the energy efficiency and…

  • Unified VLSI architecture for photo core transform used in JPEG XR

    0 out of 5
    4,500

    Unified VLSI architecture for photo core transform used in JPEG XR Abstract? In JPEG XR image compression technique the unified photo core transform is used. It is designed to support high dynamic range and high definition formats thus this type of JPEG XR image compression with unified photo core transform is widely used in real…

  • UNION: A Unified Inter/Intrachip Optical Network for Chip Multiprocessors

    0 out of 5
    4,500

    UNION: A Unified Inter/Intrachip Optical Network for Chip Multiprocessors Abstract?As modern computing systems become increasingly complex, communication efficiency among and inside chips has become as important as the computation speeds of individual processing cores. Traditionally, to maximize design flexibility, interchip and intrachip communication architectures are separately designed under different constraints. Jointly designing communication architectures for…

  • Universal Network Coding-Based Opportunistic Routing for Unicast

    0 out of 5
    4,500

    Universal Network Coding-Based Opportunistic Routing for Unicast Abstract?Universal Network Coding-Based Opportunistic Routing for Unicast. Network coding-based opportunistic routing has emerged as an elegant way to optimize the capacity of lossy wireless multihop networks by reducing the amount of required feedback messages. Most of the works on network coding-based opportunistic routing in the literature assume that…

End of content

End of content