Showing 49–60 of 320 results

  • Placeholder

    An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

    0 out of 5
    4,500

    An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing Abstract? In cloud computing, data owners host their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, this new paradigm of data hosting service also introduces new security challenges, which…

  • Placeholder

    An efficient Multiple Object Detection and tracking framework for automatic counting and video surveillance application

    0 out of 5
    4,500

    An efficient Multiple Object Detection and tracking framework for automatic counting and video surveillance application Abstract?Automatic visual object counting and video surveillance have important applications for home and business environments, such as security and management of access points. However, in order to obtain a satisfactory performance these technologies need professional and expensive hardware, complex installations…

  • An efficient tree-based algorithm for mining sequential patterns with multiple

    0 out of 5
    4,500

    An efficient tree-based algorithm for mining sequential patterns with multiple Abstract? Mining frequent sequences is a step in the sequential patterns discovering, and sequential patterns mining is an important area of research in the field of data mining. If we use the traditional algorithms such as Apriori or GSP algorithm to discover the sequential patterns…

  • An Embedded Real-Time Finger-Vein Recognition System for Mobile Devices

    0 out of 5
    3,500

    An Embedded Real-Time Finger-Vein Recognition System for Mobile Devices Abstract?The development of consumer electronics, the demand for simple, convenient, and high-security authentication systems for protecting private information stored in mobile devices has steadily increased. In consideration of emerging requirements for information protection, biometrics, which uses human physiological or behavioral features for personal identification, has been…

  • Placeholder

    An Enterprise Ontology-Based Approach to Service Specification

    0 out of 5
    4,500

    An Enterprise Ontology-Based Approach to Service Specification Abstract? the Web Service Definition Language (WSDL) and Universal Description Discovery Integration (UDDI) standards arose as ad hoc standards for the definition of service interfaces and service registries. However, even together these standards do not provide enough basis for a service consumer to get a full understanding of…

  • Placeholder

    An evolutionary approach to complex schema matching

    0 out of 5
    4,500

    An evolutionary approach to complex schema matching Abstract? A special technique, called conditionally matching rules (CMRs), for the representation of transition functions of cellular automata (CA) and its application to the evolutionary design of complex multistate CA. < Final Year Projects > The problem of designing replicating loops in 2-D CA and the square calculation…

  • Placeholder

    An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems

    0 out of 5
    4,500

    An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems Abstract? Recently, a significant amount of interest has been developed in motivating physicians to use e-health technology (especially Electronic Medical Records (EMR) systems). An important utility of such EMR systems is: a next generation of Clinical Decision Support Systems (CDSS) will extract knowledge from these…

  • An ontology-enabled framework for a geospatial problem-solving environment

    0 out of 5
    4,500

    An ontology-enabled framework for a geospatial problem-solving environment Abstract?Effective planning, response, and recovery (PRR) involving terrorist attacks or natural disasters come with a vast array of information needs. Much of the required information originates from disparate sources in widely differing formats.< Final Year Projects > However, one common attribute the information often possesses is physical…

  • Placeholder

    An unsupervised approach to develop IR system :In case of urudu

    0 out of 5
    4,500

    An unsupervised approach to develop IR system :In case of urudu Abstract?Web Search Engines are best gifts to the mankind by Information and Communication Technologies. Without the search engines it would have been almost impossible to make the efficient access of the information available on the web today. They play a very vital role in…

  • Placeholder

    Annotating search result from web data bases

    0 out of 5
    4,500

    Annotating search result from web data bases Abstract? An increasing number of databases have become web accessible through HTML form-based search interfaces. The data units returned from the underlying database are usually encoded into the result pages dynamically for human browsing. < Final Year Projects >For the encoded data units to be machine processable, which…

  • Placeholder

    Anonymization of centralized and distributed social network by sequential clustering

    0 out of 5
    4,500

    Anonymization of centralized and distributed social network by sequential clustering. We study the problem of privacy-preservation in social networks. We consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data…

  • Application Checkpointing in Grid Environment with Improved Checkpoint Reliability through Replication

    0 out of 5
    4,500

    Application Checkpointing in Grid Environment with Improved Checkpoint Reliability through Replication Abstract?Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of heterogeneous resources that are geographically distributed. The heterogeneous nature of the grid makes it more vulnerable to faults which lead to either the failure of the job or delay…

End of content

End of content