Showing 937–948 of 1084 results

  • Service-generated Big Data and Big Data-as-a-Service: An Overview

    0 out of 5
    4,500

    Service-generated Big Data and Big Data-as-a-Service: An Overview Abstract?The prevalence of service computing and cloud computing, more and more services are emerging on the Internet, generating huge volume of data, such as trace logs, QoS information, service relationship, etc. The overwhelming service-generated data become too large and complex difficult < Final Year Projects 2016 >…

  • Set predicates in sql:Enabling set-level comparisons for dynamically formed groups

    0 out of 5
    4,500

    Set predicates in sql:Enabling set-level comparisons for dynamically formed groups Abstract?Set predicates in sql:Enabling set-level comparisons for dynamically formed groups. In data warehousing and OLAP applications, scalar-level predicates in SQL become increasingly inadequate to support a class of operations that require set-level comparison semantics, i.e., comparing a group of tuples with multiple values. Currently, complex…

  • Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    0 out of 5
    4,500

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Abstract? Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. Cloud computing is an emerging data interactive paradigm to realize users? data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the…

  • Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    0 out of 5
    4,500

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Abstract? Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. Cloud computing is an emerging data interactive paradigm to realize users? data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the…

  • Signature Seraching in a Networked Collection of files

    0 out of 5
    4,500

    Signature Seraching in a Networked Collection of files Abstract?Signature Seraching in a Networked Collection of files. A signature is a data pattern of interest in a large data file or set of large data files. Such signatures that need to be found arise in applications such as DNA sequence analysis, network intrusion detection, biometrics, <...

  • Similarity Measure Selection for Clustering Time Series Databases

    0 out of 5
    4,500

    Similarity Measure Selection for Clustering Time Series Databases Abstract? Similarity Measure Selection for Clustering Time. Series Databases Clustering has become a popular task associated with time series. The choice of a suitable distance measure is crucial to the clustering process and, given the vast number of distance measures for time series available in the literature…

  • Single-Ended 9T SRAM Cell for Near-Threshold Voltage Operation With Enhanced Read Performance in 22-nm FinFET Technology

    0 out of 5
    4,500

    Single-Ended 9T SRAM Cell for Near-Threshold Voltage Operation With Enhanced Read Performance in 22-nm FinFET Technology Abstract? Single-Ended 9T SRAM Cell for Near-Threshold Voltage Operation With Enhanced Read Performance in 22-nm FinFET Technology. Although near-threshold(Vth)operation is an attractive method for energy and performance-constrained applications,it suffers from problems in terms of circuit stability, particularly,for static random…

  • SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design

    0 out of 5
    4,500

    SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design Abstract?SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design. The session initiation protocol (SIP) is widely used for controlling multimedia communication sessions over the Internet Protocol (IP). Effectively detecting a flooding attack to the SIP proxy server is critical to ensure robust multimedia communications over the…

  • Sitware Event Management

    0 out of 5
    4,500

    Sitware Event Management Abstract? Generally web search engines are built to serve all users, independent of the individual needs of any user. Personalization of web search is to carry out retrieval accessing < Final Year Projects 2016 > for each user incorporating their interest. This has become an important factor in daily usage as it…

  • Sleep Scheduling for Geographic Routing inDuty-Cycled Mobile Sensor Networks

    0 out of 5
    4,500

    Sleep Scheduling for Geographic Routing inDuty-Cycled Mobile Sensor Networks Abstract?As the most promising routing scheme in wireless sensor networks (WSNs), recently the research focus of geograph- ic routing is shifting towards duty-cycled sensor networks in which sensors are sleep scheduled to save energy consumption. However, nearly all research work about geographic routing in duty-cycled sensor…

  • Sliced Message Passing: High Throughput Overlapped Decoding of High-Rate Low-Density Parity-Check Codes

    0 out of 5
    4,500

    Sliced Message Passing: High Throughput Overlapped Decoding of High-Rate Low-Density Parity-Check Codes Abstract?The efficient implementation of high-rate high-throughout low-density parity-check (LDPC) code decoding presents challenges to both fully parallel decoding and memory-sharing partially parallel decoding schemes. In this paper, a new decoding scheme, sliced message passing (SMP), is introduced. The key idea is to slice…

  • Smart Phone based Accident Detection System based on Drowsiness Detection and Accelerometer

    0 out of 5
    3,500

    Smart Phone Based Accident Dectection S Based On Drowsiness Detection and Accelerometer Abstract? Drowsiness is a safety hazard in commercial vehicle driving. The conditions to which truck drivers are exposed put them at higher risk as compared to passenger car drivers. Unobtrusive drowsiness detection methods can avoid catastrophic crashes by warning or assisting the drivers….

End of content

End of content