TruXy: Trusted Storage Cloud for Scientific Workflows Abstract? TruXy: Trusted Storage Cloud for Scientific Workflows. A wide array of Clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and tools such as < Final Year Projects 2016 > Taverna and Galaxy to model the execution of…
Twitter data analysis by means of Strong FlippingGeneralized Itemsets Abstract?Social Network Services (SNS) like Facebook, Twitter, Sina Weibo etc. are widely used all over the world today. People use them to keep in touch with friends and make new friends online. In China, Sina Weibo is one of the most successful social network service and…
Typicality-Based Collaborative Filtering Recommendation Abstract? Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy, and big-error in predictions. We borrow ideas of object typicality from cognitive psychology and propose a novel typicality-based collaborative filtering recommendation method named TyCo. A…
Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services Abstract?Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services.The rapid development of Internet of things (IoT) technology makes it possible for connecting various smart objects together through the Internet and providing more data interoperability methods for application purpose. Recent research…
Ultralow-Voltage High-Speed Flash ADC Design Strategy Based on FoM-Delay Product Abstract? The ultralow-voltage (ULV) design strategy for high-speed flash analog-to-digital converters (ADCs). A lower supply voltage decreases the energy consumption at the cost of conversion speed. A new index, the figure-of-merit (FoM)-delay (FD) product, is introduced to provide a balance between the energy efficiency and…
Unified VLSI architecture for photo core transform used in JPEG XR Abstract? In JPEG XR image compression technique the unified photo core transform is used. It is designed to support high dynamic range and high definition formats thus this type of JPEG XR image compression with unified photo core transform is widely used in real…
UNION: A Unified Inter/Intrachip Optical Network for Chip Multiprocessors Abstract?As modern computing systems become increasingly complex, communication efficiency among and inside chips has become as important as the computation speeds of individual processing cores. Traditionally, to maximize design flexibility, interchip and intrachip communication architectures are separately designed under different constraints. Jointly designing communication architectures for…
Universal Network Coding-Based Opportunistic Routing for Unicast Abstract?Universal Network Coding-Based Opportunistic Routing for Unicast. Network coding-based opportunistic routing has emerged as an elegant way to optimize the capacity of lossy wireless multihop networks by reducing the amount of required feedback messages. Most of the works on network coding-based opportunistic routing in the literature assume that…
Unsupervised Feature Selection with Controlled Redundancy (UFeSCoR) Abstract? Unsupervised Feature Selection with Controlled Redundancy (UFeSCoR). Features selected by a supervised / unsupervised technique often include redundant or correlated features. While use of correlated features may result in an increase in the design and decision making cost, removing redundancy completely can make the system vulnerable to…
Unusual Event Detection in Low Resolution Video for enhancing ATM security Abstract? In real world applications, tracking target in low resolution video is a challenging task because there is loss of discriminative detail in the visual appearance of moving object. The existing methods are mostly based on the enhancement of LR (low resolution) video by…
User-Defined Privacy Grid System for Continuous Location-Based Services Abstract? User-Defined Privacy Grid System for Continuous Location-Based Services. Location-based services < Final Year Projects 2016 > require users to continuously report their location to a potentially untrusted serverto obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques for…
Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment Abstract? Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment. Infrastructure as a Service < Final Year Projects 2016 > IaaS clouds provide virtual machines(VMs) under a pay-per-use business model, which can be used to create a dynamically…