Showing 925–936 of 1084 results

  • Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware

    0 out of 5
    4,500

    Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware Abstract? Recently, malware has increasingly become a critical threat to embedded systems, while the conventional software solutions, such as antivirus and patches, have not been so successful in defending the ever-evolving and advanced malicious programs. we propose a hard ware enhanced architecture, GuardOL, to perform…

  • Semi-Automatic Segmentation and Classification of Pap Smear Cells

    0 out of 5
    4,500

    Semi-Automatic Segmentation and Classification of Pap Smear Cells Abstract? Semi-Automatic Segmentation and Classification of Pap Smear Cells. Cytologic screening has been widely used for detecting the cervical cancers. In this study, a semiautomatic PC-based cellular image analysis system was developed for segmenting nuclear and cytoplasmic contours and for computing morphometric and textual features to train…

  • Semi-Supervised Linear Discriminant Clustering

    0 out of 5
    4,500

    Semi-Supervised Linear Discriminant Clustering Abstract?This paper devises a semi-supervised learning method called semi-supervised linear discriminant clustering (Semi-LDC). The proposed algorithm considers clustering and dimensionality reduction simultaneously by connecting K-means and linear discriminant analysis (LDA). The goal is to find a feature space where the K-means can perform well in the new space. To exploit the…

  • Semisupervised Wrapper Choice and Generation for Print-Oriented Documents

    0 out of 5
    4,500

    Semisupervised Wrapper Choice and Generation for Print-Oriented Documents Abstract? Semisupervised Wrapper Choice and Generation for Print-Oriented Documents. Information extraction from printed documents is still a crucial problem in many interorganizational workflows. Solutions for other application domains, for < Final Year Projects > example, the web, do not fit this peculiar scenario well, as printed documents…

  • Sensing as a Service: Challenges, Solutions and Future Directions

    0 out of 5
    3,500

    Sensing as a Service: Challenges, Solutions and Future Directions Abstract?Sensors on (or attached to) mobile phones can enable attractive sensing applications in different domains, such as environmental monitoring, social networking, healthcare, transportation, etc. We introduce a new concept, sensing as a service (S2aaS), i.e., < Final Year Projects > providing sensing services using mobile phones…

  • Sentiment Analysis of Twitter Data

    0 out of 5
    4,500

    Sentiment Analysis of Twitter Data Abstract? We examine sentiment analysis on Twitter data. The contributions of this paper are: (1) We introduce POS-specific prior polarity features. (2) We explore the use of a tree kernel to obviate the need for tedious feature engineering. The new features (in conjunction with previously proposed features) and the tree…

  • Sentiment analysis: from opinion mining to human-agent interaction

    0 out of 5
    4,500

    Self-Sentiment analysis: from opinion mining to human-agent interaction AbstractSelf-Sentiment analysis: from opinion mining to human-agent interaction. The opinion mining and human-agent interaction communities are currently addressing sentiment analysis from different perspectives that comprise, on the one hand, disparate sentiment-related phenomena and computational representations, and on the other hand, different detection and dialog management methods. In…

  • Sentiview:Analysis on internet famous topics

    0 out of 5
    4,500

    Sentiview:Analysis on internet famous topics Abstract?There would be value to several domains in discovering and visualizing sentiments in online posts. This paper presents SentiView, an interactive visualization system that aims to analyze public sentiments for popular topics on the Internet. SentiView combines uncertainty modeling and model-driven adjustment. By searching and correlating frequent words in text…

  • Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm

    0 out of 5
    4,500

    Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm Abstract? Steganography basically was defined for the sending secrets message which hides in the image. The secrets message transmitted from one user to another user safely. In the previous system of hiding data in image uses the AES algorithm and Lossy…

  • SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices

    0 out of 5
    4,500

    SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices Abstract? Credit card fraud is a common problem in today?s world. Financial institutions have registered major loses till today due to users being exposed of their credit card information. Shoulder-sur?ng or observation attacks, including card skimming and video recording with hidden cameras while users perform PIN-based…

  • Sequence-Growth : A Scalable and Effective Frequent Itemset Mining Algorithm for Big Data Based on MapReduce Framework

    0 out of 5
    4,500

    Sequence-Growth : A Scalable and Effective Frequent Itemset Mining Algorithm for Big Data Based on MapReduce Framework Abstract? Frequent itemset mining FIM < Final Year Projects 2016 > is an important research topic because it is widely applied in real world to ?nd the frequent itemsets and to mine human behavior patterns. FIM process is…

  • Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds

    0 out of 5
    4,500

    Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds Abstract?A service operator-aware trust scheme SOTS for resource matchmaking across < Final Year Projects 2016 > multiple clouds. Through analyzing the built-in relationship between the users, the broker, and the service resources, this paper proposes a middleware framework of trust management that can effectively reduces…

End of content

End of content