An Intelligent Economic Approach for Dynamic Resource Allocation in Cloud Services Abstract?With Inter-Cloud, distributed cloud and open cloud exchange < Final Year Projects 2016 > OCX emerging, a comprehensive resource allocation approach is fundamental to highly competitive cloud market. Oriented to infrastructure as a service (IaaS), an intelligent economic approach for dynamic resource allocation (IEDA)…
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques Abstract? An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques. Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and…
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques Abstract?Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the pattern as one of the weakest…
An online examination system supporting user-defined question type Abstract? An online examination system supporting user-defined question type. The online examination system not only reflects the justification and objectivity of examination, but also releases the workload of teachers, which is accepted by more and more schools, certification organizations and training organizations. Most online examination systems only…
An Ontology-based Approach to Text Summarization Abstract?An Ontology-based Approach to Text Summarization. Extractive text summarization aims to create a condensed version of one or more source documents by selecting the most informative sentences. Research in text summarization has therefore often focused on measures of the usefulness of sentences for a summary. We present an approach…
An ontology-enabled framework for a geospatial problem-solving environment Abstract?Effective planning, response, and recovery (PRR) involving terrorist attacks or natural disasters come with a vast array of information needs. Much of the required information originates from disparate sources in widely differing formats.< Final Year Projects > However, one common attribute the information often possesses is physical…
An OpenFlow Architecture for Energy Aware Traffic Engineering in Mobile Networks Abstract?To cope with the growing traf?c demand, future mobile networks will be denser and integrate heterogeneous technologies. However, if not properly engineered, such networks may incur in huge energy wastage when there is little traf?c, and may suffer from an unbearable management burden caused…
An OpenFlow Architecture for Energy-Aware Traffic Engineering in Mobile Networks Abstract? To cope with the growing traffic demand, future mobile networks will be denser and integrate heterogeneous technologies. However, if not properly engineered, such networks may incur huge energy waste when there is little traffic, and may suffer from an unbearable management burden caused by…
An Optimal Scheduling Algorithm for Maximizing Throughput in WiMAX Mesh Networks Abstract? The WiMAX mesh network (WMN) architecture is defined in the IEEE 802.16 standard for increasing network coverage and improving communication performance. In the past few years, several greedy or heuristic algorithms have been proposed to cope with the scheduling problem in WMNs. However,…
An Optimal-Distance-Based Transmission Strategy for Lifetime Maximization of Wireless Sensor Networks Abstract? An Optimal-Distance-Based Transmission Strategy for Lifetime Maximization of Wireless Sensor Networks. An effective transmission strategy plays a vital role in maximizing the lifetime of wireless sensor networks WSNs< Final Year Projects 2016 > To fulfill such a maximization aim, an optimal-distance-based transmission strategy…
An optimized algorithm for association rule mining using FP tree Abstract? An optimized algorithm for association rule mining using FP tree..Data mining is used to deal with the huge size of the data stored in the database to extract the desired information and knowledge. It has various techniques for the extraction of data; association rule…
AN OVERVIEW OF DATA HIDING TECHNIQUE:-STEGANOGRAPHY Abstract? AN OVERVIEW OF DATA HIDING TECHNIQUE:-STEGANOGRAPHY. The idea of this paper is to invent a new strategy in Steganography to get the minimum effect in audio which is used to hide data into it. ?Progress always involves risk? Fredrick Wilcox observed that technological progress of computer science and…