Showing 1045–1056 of 1083 results

  • TruXy: Trusted Storage Cloud for Scientific Workflows

    0 out of 5
    4,500

    TruXy: Trusted Storage Cloud for Scientific Workflows Abstract? TruXy: Trusted Storage Cloud for Scientific Workflows. A wide array of Clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and tools such as < Final Year Projects 2016 > Taverna and Galaxy to model the execution of…

  • Placeholder

    Twitter data analysis by means of Strong FlippingGeneralized Itemsets

    0 out of 5
    4,500

    Twitter data analysis by means of Strong FlippingGeneralized Itemsets Abstract?Social Network Services (SNS) like Facebook, Twitter, Sina Weibo etc. are widely used all over the world today. People use them to keep in touch with friends and make new friends online. In China, Sina Weibo is one of the most successful social network service and…

  • Typicality-Based Collaborative Filtering Recommendation

    0 out of 5
    4,500

    Typicality-Based Collaborative Filtering Recommendation Abstract? Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy, and big-error in predictions. We borrow ideas of object typicality from cognitive psychology and propose a novel typicality-based collaborative filtering recommendation method named TyCo. A…

  • Placeholder

    Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services

    0 out of 5
    4,500

    Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services Abstract?Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services.The rapid development of Internet of things (IoT) technology makes it possible for connecting various smart objects together through the Internet and providing more data interoperability methods for application purpose. Recent research…

  • Ultralow-Voltage High-Speed Flash ADC Design Strategy Based on FoM-Delay Product

    0 out of 5
    4,500

    Ultralow-Voltage High-Speed Flash ADC Design Strategy Based on FoM-Delay Product Abstract? The ultralow-voltage (ULV) design strategy for high-speed flash analog-to-digital converters (ADCs). A lower supply voltage decreases the energy consumption at the cost of conversion speed. A new index, the figure-of-merit (FoM)-delay (FD) product, is introduced to provide a balance between the energy efficiency and…

  • Unified VLSI architecture for photo core transform used in JPEG XR

    0 out of 5
    4,500

    Unified VLSI architecture for photo core transform used in JPEG XR Abstract? In JPEG XR image compression technique the unified photo core transform is used. It is designed to support high dynamic range and high definition formats thus this type of JPEG XR image compression with unified photo core transform is widely used in real…

  • UNION: A Unified Inter/Intrachip Optical Network for Chip Multiprocessors

    0 out of 5
    4,500

    UNION: A Unified Inter/Intrachip Optical Network for Chip Multiprocessors Abstract?As modern computing systems become increasingly complex, communication efficiency among and inside chips has become as important as the computation speeds of individual processing cores. Traditionally, to maximize design flexibility, interchip and intrachip communication architectures are separately designed under different constraints. Jointly designing communication architectures for…

  • Universal Network Coding-Based Opportunistic Routing for Unicast

    0 out of 5
    4,500

    Universal Network Coding-Based Opportunistic Routing for Unicast Abstract?Universal Network Coding-Based Opportunistic Routing for Unicast. Network coding-based opportunistic routing has emerged as an elegant way to optimize the capacity of lossy wireless multihop networks by reducing the amount of required feedback messages. Most of the works on network coding-based opportunistic routing in the literature assume that…

  • Unsupervised Feature Selection with Controlled Redundancy (UFeSCoR)

    0 out of 5
    4,500

    Unsupervised Feature Selection with Controlled Redundancy (UFeSCoR) Abstract? Unsupervised Feature Selection with Controlled Redundancy (UFeSCoR). Features selected by a supervised / unsupervised technique often include redundant or correlated features. While use of correlated features may result in an increase in the design and decision making cost, removing redundancy completely can make the system vulnerable to…

  • Unusual Event Detection in Low Resolution Video for enhancing ATM security

    0 out of 5
    4,500

    Unusual Event Detection in Low Resolution Video for enhancing ATM security Abstract? In real world applications, tracking target in low resolution video is a challenging task because there is loss of discriminative detail in the visual appearance of moving object. The existing methods are mostly based on the enhancement of LR (low resolution) video by…

  • User-Defined Privacy Grid System for Continuous Location-Based Services

    0 out of 5
    4,500

    User-Defined Privacy Grid System for Continuous Location-Based Services Abstract? User-Defined Privacy Grid System for Continuous Location-Based Services. Location-based services < Final Year Projects 2016 > require users to continuously report their location to a potentially untrusted serverto obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques for…

  • Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment

    0 out of 5
    4,500

    Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment Abstract? Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment. Infrastructure as a Service < Final Year Projects 2016 > IaaS clouds provide virtual machines(VMs) under a pay-per-use business model, which can be used to create a dynamically…

End of content

End of content