A Comber Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS attack Abstract?Cloud computing is an internet based pay as use service which provides three layered services (Software as a Service, Platform as a Service and Infrastructure as a Service) to its consumers on demand. These on demand service facilities provide to its…
A Combination of Feature Extraction Methods with an Ensemble of Different Classifiers for Protein Structural Class Prediction Problem Abstract? A Combination of Feature Extraction Methods with an Ensemble of Different Classifiers for Protein Structural Class Prediction Problem. Better understanding of structural class of a given protein reveals important information about its overall folding type and…
A combined approach to ensure data security in cloud computing Abstract? A combined approach to ensure data security in cloud computing. Offering real-time data security for petabytes of data is important for cloud computing. A recent survey on cloud security states that the security of users’ data has the highest priority as well as concern….
A combined mining-based framework for predicting telecommunications customer payment behaviors Abstract?A combined mining-based framework for predicting telecommunications customer payment behaviors. Recommender systems are mostly well known for their applications in e-commerce sites and are mostly static models. Classical personalized recommender algorithm include collaborative filtering method applied in Amazon, matrix factorization algorithm from Netflix, < Final...
A Combined SDC-SDF Architecture for Normal I/O Pipelined Radix-2 FFT Abstract? An ef?cient combined single-path delay commutator-feedback < Final Year Projects 2016 > SDC-SDF radix-2 pipelined fast Fourier transform architecture, which includes log N – 1 SDC stages, and 1 SDF stage. The SDC processing engine is proposed to achieve a 100% hardware resource utilization…
A Communication-Based Appliance Scheduling Scheme forConsumer-Premise Energy Management Systems Abstract? A communication-based load scheduling protocol is proposed for in-home appliances connected over a home area network. Specifically, a joint access and scheduling approach for appliances is developed to enable in-home appliances to coordinate power usage so that the total energy demand for the home is…
A Comparative Study of Power Supply Architectures in Wireless EV Charging Systems Abstract? A Comparative Study of Power Supply Architectures in Wireless EV Charging Systems. Two of the primary power supply architectures being predominantly used for wireless electric vehicle < Final Year Projects 2016 > EV charging, namely the series LC resonant (SLC) and the…
A Completed Modeling of Local Binary Pattern Operator for Texture Classification Abstract? A completed modeling of the LBP operator is proposed and an associated completed LBP (CLBP) scheme is developed for texture classification. A local region is represented by its center pixel and a local difference sign-magnitude transform (LDSMT). The center pixels represent the image…
A Completed Modeling of Local Binary Pattern Operator for Texture Classification Abstract? A completed modeling of the LBP operator is proposed and an associated completed LBP (CLBP) scheme is developed for texture classification. A local region is represented by its center pixel and a local difference sign-magnitude transform < Final Year Projects 2016 > LDSMT….
A Computational Dynamic Trust Model for User Authorization Abstract? A Computational Dynamic Trust Model for User Authorization. Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for…
A Computational Dynamic Trust Model for User Authorization Abstract? A Computational Dynamic Trust Model for User Authorization. Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for…
A Contrast Adjustment Thresholding Method for Surface Defect Detection Based on Mesoscopy Abstract? Titanium-coated surfaces are prone to tiny defects such as very small cracks, which are not easily observable by the naked eye or optical microscopy. In this study, two new thresholding methods, namely contrast-adjusted Otsu?s method and contrast-adjusted median-based Otsu?s method, are proposed…