Showing 1009–1020 of 1075 results

  • Toward Energy-Efficient Cloud Computing Prediction, Consolidation and Over Commitment

    0 out of 5
    4,500

    Toward Energy-Efficient Cloud Computing Prediction, Consolidation and Over Commitment Abstract? : Toward Energy-Efficient Cloud Computing Prediction, Consolidation < Final Year Projects 2016 >amalgamation and Over Commitment. Energy consumption is the consumption of energy or power. Cloud Computing is a developing technology which is revolutionizing the IT Infrastructure due to its high scalability and flexibility in…

  • TOWARD MULTI-GIGABIT WIRELESS: DESIGN OF HIGH-THROUGHPUT MIMO DETECTORS WITH HARDWARE-EFFICIENT ARCHITECTURE

    0 out of 5
    4,500

    TOWARD MULTI-GIGABIT WIRELESS: DESIGN OF HIGH-THROUGHPUT MIMO DETECTORS WITH HARDWARE-EFFICIENT ARCHITECTURE Abstract?This paper presents a hardware-efficient architecture for 4?4 and 8?8 high-throughput MIMO detectors. The adopted non-constant K-best algorithm tends to keep more survival nodes in top search tree layers and reduce computational complexity in bottom layers as opposed to the conventional K-best algorithm. A…

  • Toward Transcoding as a Service in a Multimedia Cloud: Energy-Efficient Job-Dispatching Algorithm

    0 out of 5
    4,500

    Toward Transcoding as a Service in a Multimedia Cloud: Energy-Efficient Job-Dispatching Algorithm Abstract? Toward Transcoding as a Service in a Multimedia. Cloud: Energy-Efficient Job-Dispatching AlgorithmWe investigate the energy-efficient job-dispatching algorithm for transcoding as a service < Final Year Projects 2016 > TaaS in a multimedia cloud. We aim to minimize the energy consumption of service…

  • Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

    0 out of 5
    4,500

    Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service Abstract?Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service. Collection and analysis of various logs < Final Year Projects 2016 > e.g., process logs, network logs are fundamental activities in computer forensics. Ensuring the security of the activity logs is therefore crucial to ensure reliable forensics investigations. However,…

  • Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks

    0 out of 5
    4,500

    Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks Abstract? We address how to design a distributed movement strategy for mobile collectors, which can be either physical mobile agents or query/collector packets periodically launched by the sink, to achieve successful data gathering in wireless sensor networks. Formulating the problem as general random…

  • Towards Effective Bug Triage with Software Data Reduction Techniques

    0 out of 5
    4,500

    Towards E ective Bug Triage with Software Data Reduction Techniques Abstract? Towards Effective Bug Triage with Software Data Reduction Techniques. Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease…

  • Towards Effective Bug Triage with Software Data Reduction Techniques

    0 out of 5
    4,500

    Towards Effective Bug Triage with Software Data Reduction Techniques Abstract? Towards Effective Bug Triage with Software Data Reduction Techniques. Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease the…

  • Towards Information Diffusion in Mobile Social Networks

    0 out of 5
    4,500

    Towards Information Diffusion in Mobile Social Networks Abstract? Towards Information Diffusion in Mobile Social Networks. The emerging of mobile social networks opens opportunities for viral marketing. However, before fully utilizing mobile social networks as a platform for viral marketing, many challenges have to be addressed. In this paper, we address the < Final Year Projects...

  • Towards Privacy Preserving Publishing of Set-valued Data on Hybrid Cloud

    0 out of 5
    4,500

    Towards Privacy Preserving Publishing of Set-valued Data on Hybrid Cloud Abstract? Towards Privacy Preserving Publishing of Set-valued Data on Hybrid Cloud. Storage as a service has become an important paradigm in cloud computing for its great flexibility and economic savings. However, the development is hampered by data privacy concerns: data owners no longer physically possess…

  • Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds

    0 out of 5
    4,500

    Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds Abstract? Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds.Cloud computing is growing exponentially, whereby there are now hundreds of cloud service providers (CSPs) of various sizes. While the cloud consumers may enjoy cheaper data storage and computation offered in this multi-cloud environment, they are also in face…

  • Traffic Engineering in Software Defined Networks

    0 out of 5
    4,500

    Traffic Engineering in Software Defined Networks Abstract?Software Defined Networking is a new networking paradigm that separates the network control plane from the packet forwarding plane and provides applications with an abstracted centralized view of the distributed network state. A logically centralized controller that has a global network view is responsible for all the control decisions…

  • Traffic Sign Recognition for Intelligent Vehicle/Driver Assistance System Using Neural Network on OpenCV

    0 out of 5
    4,500

    Traffic Sign Recognition for Intelligent Vehicle/Driver Assistance System Using Neural Network on OpenCV Abstract? Traffic Sign Recognition (TSR) is used to regulate traffic signs, warn a driver, and command or prohibit certain actions. A fast real-time and robust automatic traffic sign detection and recognition can support and disburden the driver and significantly increase driving safety…

End of content

End of content