Decentralized Access control with Anonymous Authentication of Data Store in clouds. Decentralized storage system for accessing data with anonymous authentication provides more secure user authentication, user revocation and prevents replay attacks. Access control is processed on decentralized KDCs it is being more secure for data encryption. Generated decentralized KDC’s are then grouped by (KGC). Our…
?Decision Trees for Mining Data Streams Based on the McDiarmid?s Bound Abstract? Decision Trees for Mining Data Streams Based on the McDiarmid?s Bound.In mining data streams the most popular tool is the Hoeffding tree algorithm. It uses the Hoeffding’s bound to determine the smallest number of examples needed at a node to select a splitting…
Depth Estimation of Face Images Using the Nonlinear Least-Squares Model Abstract? we propose an efficient algorithm to reconstruct the 3D structure of a human face from one or more of its 2D images with different poses. In our algorithm, the nonlinear least-squares model is first employed to estimate the depth values of facial feature…
Design and Simulation of Photovoltaic super system using simulink Abstract?Static synchronous compensators (STATCOMs) have been widely used for voltage support over the past decade, to improve power quality and voltage stability. However, STATCOMs are limited in their ability to improve the system stability margin due to their restricted capability for delivering real power.< Final…
Design of discrete fourier transform modulated filterbank with sharp transition band Abstract?The authors consider a high-performance discrete Fourier transform (DFT)-modulated finite impulse response (FIR) filter bank with sharp transition width. The design of this filter bank is very expensive by the standard method, and hence the frequency response masking (FRM) technique is developed so…
Detecting and Locating Faulty Nodes in Smart Grids Based on High Frequency Signal Injection Abstract?An on-line method for detecting and locating a faulty node in the utility grid is proposed for smart grids. The method is based on injection of high frequency (A-Band) current signal into the grid that would impose voltages (less than 1V…
Detection and Classification of Apple Fruit Diseases using Complete Local Binary Patterns Abstract? Diseases in fruit cause devastating problem in economic losses and production in agricultural industry worldwide. In this paper, a solution for the detection and classification of apple fruit diseases is proposed and experimentally validated.< Final Year Projects > The image processing…
Detection of Abnormalities in Retinal Images Abstract?The human eye is the organ which gives us the sense of sight. The eye reflects or emits the light to interpret the shapes, colors, and dimensions of objects in the world. Retina places a major role in the human vision system.< Final Year Projects > The retina…
Detection of Microcalcifications in Mammograms Using Support Vector Machine Abstract?For years cancer has been one of the biggest threats to human life, it is expected to become the leading cause of death over the next few decades. Early detection of breast cancer can play an important role in reducing the associated morbidity and mortality…
Dirichlet Process Mixture Model for Document Clustering with Feature Partition Abstract? Finding the appropriate number of clusters to which documents should be partitioned is crucial in document clustering. In this paper, we propose a novel approach, namely DPMFP, to discover the latent cluster structure based on the DPM model without requiring the number of clusters…
Disclosing climate change patterns using an adaptive Markov chain pattern detection method Abstract?proposes an adaptive Markov chain pattern detection (AMCPD) method for disclosing the climate change patterns of Singapore through meteorological data mining. Meteorological variables, including daily mean temperature, mean dew point temperature, mean visibility, mean wind speed, maximum sustained wind speed, maximum temperature…
Distributed malware propagation in Mobile Adhoc NETwork Abstract?The openness of the Android operating system increased the number of applications developed, but it also introduced a new propagation vector for mobile malware. We model the propagation of mobile malware using epidemiology theory and study the problem as a function of the underlying mobility models.< Final Year...