Showing 253–264 of 1084 results

  • CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability

    CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability

    0 out of 5
    4,500

    CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability Abstract? CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability. Nowadays, more and more enterprises and organizations are hosting their data into the cloud, in order to reduce the IT maintenance cost and enhance the data reliability. However, facing the numerous cloud vendors as…

  • CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability

    CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability

    0 out of 5
    4,500

    CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability Abstract? More and more enterprises and organizations are hosting their data into the cloud, in order to reduce the IT maintenance cost and enhance the data reliability. However, facing the numerous cloud vendors as well as their heterogenous pricing policies, customers may well be perplexed…

  • Chatting Application Using Google Cloud  Messaging

    Chatting Application Using Google Cloud Messaging

    0 out of 5
    3,500

    Chatting Application Using Google Cloud Messaging Abstract? Chat Application using Google Cloud Messaging.A GCM implementation includes a Google connection server, an app server in your environment that interacts with the connection server via HTTP or XMPP protocol, and a client app. Google GCM Connection Servers take messages from your app server and send them to…

  • Chatting Application Using Google Cloud Messaging

    Chatting Application Using Google Cloud Messaging

    0 out of 5
    3,500

    Chatting Application Using Google Cloud Messaging Abstract? Chatting Application Using Google Cloud Messaging. Google Cloud Messaging < Final Year Projects 2016 > GCM is a free service that enables users to send messages between servers and client apps. This includes downstream messages from servers to client apps, and upstream messages from client apps to servers….

  • CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution

    CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution

    0 out of 5
    4,500

    CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution Abstract?CipherXRay: Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic algorithms (e.g., packing, encrypting C&C communication) to protect themselves from being analyzed. The use of cryptographic algorithms and truly transient cryptographic secrets inside the malware binary imposes a key obstacle to…

  • Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing

    Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing

    0 out of 5
    4,500

    Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing Abstract? In the cloud, for achieving access control and keeping data confidential, the data owners could adopt attribute-based encryption to encrypt the stored data. Users with limited computing power are however more likely to delegate the mask of the decryption task to the cloud…

  • CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications

    CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications

    0 out of 5
    4,500

    CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications Abstract? CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications. We propose a forensic analysis system called crime investigation system using the relative importance < Final Year Projects 2016 >…

  • Civil Registration

    Civil Registration

    0 out of 5
    3,500

    Civil Registration Abstract?The trends models identity management available, authentication, authorization and audit have been analyzed in order to mitigate the vulnerabilities and risks of the information. The development of this model for the Civil Registry of Ecuador in the next phase was determined. The deductive method was used in the analysis. Resulted methodologies should be…

  • Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams

    Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams

    0 out of 5
    4,500

    Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams Abstract?Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams. Data stream classification poses many challenges to the data mining community. In this paper, we address four such major challenges, namely, infinite length, concept-drift, concept-evolution, and feature-evolution. Since a data stream is theoretically infinite in…

  • Classification And Novel Class Detection In Concept-Drifting Data Streams Under Time Constraints

    Classification And Novel Class Detection In Concept-Drifting Data Streams Under Time Constraints

    0 out of 5
    4,500

    Classification And Novel Class Detection In Concept-Drifting Data Streams Under Time Constraints Abstract? Classification And Novel Class Detection In Concept-Drifting Data Streams Under Time Constraints. Data stream is continuous < Final Year Projects > and always change in nature. Data stream mining is the process of extracting knowledge form continuous data. Due to its dynamic…

  • Cleanliness and Orderliness of the Campus

    Cleanliness and Orderliness of the Campus

    0 out of 5
    3,500

    Cleanliness and Orderliness of the Campus Abstract? Cleanliness and Orderliness of the Campus. This Project is developed mainly for the welfare of students of the college. This app helps the students in maintaining cleanliness in < Final Year Projects 2016 > different ways. The student can install their app in their own mobile phones. This…

  • Closeness: A New Privacy Measure For Data Publishing

    Closeness: A New Privacy Measure For Data Publishing

    0 out of 5
    4,500

    Closeness: A New Privacy Measure For Data Publishing Abstract?Closeness: The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to certain ?identifying? attributes) contains at least k records. Recently, several authors have recognized that k-anonymity cannot prevent attribute disclosure. The…

End of content

End of content