A Universal Fairness Evaluation Framework for Resource Allocation in Cloud Computing Abstract? In cloud computing, fairness is one of the most significant indicators to evaluate resource allocation algorithms, which reveals whether each user is allocated as much as that of all other users having the same bottleneck. However, how fair an allocation algorithm is remains…
A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless Cellular Networks Abstract?Multicast/broadcast is regarded as an efficient technique for wireless cellular networks to transmit a large volume of common data to multiple mobile users simultaneously. To guarantee the quality of service for each mobile user in such single-hop multicasting, the base-station transmitter…
A Virtual Coordinate-Based Bypassing Void Routing for Wireless Sensor Networks Abstract? To solve the routing void problem in geographic routing, high control overhead and transmission delay are usually taken in wireless sensor networks. Inspired by the structure composed of edge nodes around which there is no routing void, an ef?cient bypassing void routing protocol based…
A Visual Model-Based Perceptual Image Hash for Content Authentication Abstract?Perceptual image hash has been widely investigated in an attempt to solve the problems of image content authentication and content-based image retrieval. In this paper, we combine statistical analysis methods and visual perception theory to develop a real perceptual image hash method for content authentication. To…
A Web Search Engine-Based Approach to Measure Semantic Similarity between Words Abstract? A Web Search Engine-Based Approach to Measure Semantic Similarity between Words. Measuring the semantic similarity between words is an important component in various tasks on the web such as relation extraction, community mining, < Final Year Projects > document clustering, and automatic metadata…
AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments Abstract? Anonymous communications are important for many of the applications of mobile ad hoc networks (MANETs) deployed in adversary environments. A major requirement on the network is the ability to provide unidenti?ability and unlinkability for mobile nodes and their traf?c. Although a number of anonymous…
Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing Verification for Visual Surveillance Abstract? An effective approach for detecting < Final Year Projects 2016 > abandoned luggage in surveillance videos. We combine short- and long-term background models to extract foreground objects, where each pixel in an input image is classi?ed as a 2-bit code. Subsequently,…
Abnormal crowd behaviour detection by using partical entorpy Abstract? Abnormal crowd behaviour detection by using partical entorpy. We propose a fully unsupervised method for abnormal activity detection in crowded scenes. Neither normal nor abnormal training examples are needed before detection. By observing that in crowded scenes, normal activities are the behaviors performed by the majority…
AC-Plus Scan Methodology for Small Delay Testing and Characterization Abstract? AC-Plus Scan Methodology for Small Delay Testing and Characterization. Small delay defects escaping traditional delay testing could cause a device to malfunction in the field and thus detecting these defects is often necessary. To address this issue, we propose three test modes in a new…
Access Control and Data Updation for Shared Data in Cloud Abstract? Access Control and Data Updation for Shared Data in Cloud. Cloud computing enables data owners to outsource their computationally intensive tasks and store private data to the shared cloud. To enhance the security while preserving the flexibility of data sharing, Attribute Based Encryption (ABE)…
ACCIDENT TRACKING APP FOR ANDROID MOBILE Abstract? ACCIDENT TRACKING APP FOR ANDROID MOBILE. There are many situations which request a tracking and localization system. Some examples are car/persons tracking and localization in case of accidents or disasters. Due to the hardware and software characteristics of the smartphones, these devices are suitable to work as terminals…
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Abstract? Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data. Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized user can still compromise the privacy of a person leading to…