Showing 1801–1812 of 2067 results

  • Service-generated Big Data and Big Data-as-a-Service: An Overview

    Service-generated Big Data and Big Data-as-a-Service: An Overview

    0 out of 5
    4,500

    Service-generated Big Data and Big Data-as-a-Service: An Overview Abstract?The prevalence of service computing and cloud computing, more and more services are emerging on the Internet, generating huge volume of data, such as trace logs, QoS information, service relationship, etc. The overwhelming service-generated data become too large and complex difficult < Final Year Projects 2016 >…

  • Set predicates in sql:Enabling set-level comparisons for dynamically formed groups

    Set predicates in sql:Enabling set-level comparisons for dynamically formed groups

    0 out of 5
    4,500

    Set predicates in sql:Enabling set-level comparisons for dynamically formed groups Abstract?Set predicates in sql:Enabling set-level comparisons for dynamically formed groups. In data warehousing and OLAP applications, scalar-level predicates in SQL become increasingly inadequate to support a class of operations that require set-level comparison semantics, i.e., comparing a group of tuples with multiple values. Currently, complex…

  • Shape Similarity Analysis by Self-Tuning Locally Constrained Mixed-Diffusion

    Shape Similarity Analysis by Self-Tuning Locally Constrained Mixed-Diffusion

    0 out of 5
    4,500

    Shape Similarity Analysis by Self-Tuning Locally Constrained Mixed-Diffusion   Abstract?Similarity analysis is a powerful tool for shape matching/retrieval and other computer vision tasks. In the literature, various shape (dis)similarity measures have been introduced. Different measures specialize on different aspects of the data. < Final Year Projects > In this paper, we consider the problem of…

  • Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    0 out of 5
    4,500

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Abstract? Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. Cloud computing is an emerging data interactive paradigm to realize users? data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the…

  • Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    0 out of 5
    4,500

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Abstract? Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. Cloud computing is an emerging data interactive paradigm to realize users? data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the…

  • Sharing of Patient confidential data using ECG steganography

    Sharing of Patient confidential data using ECG steganography

    0 out of 5
    4,500

    Sharing of Patient confidential data using ECG steganography Abstract?Sharing of Patient confidential data using ECG steganography. The number of aging population are growing significantly. In accordance with Health Insurance Portability and Accountability Act (HIPAA) the patient’s privacy and security is important in the protection of healthcare privacy. Point-Of-care (PoC) is an application used in hospitals…

  • Signature Seraching in a Networked Collection of files

    Signature Seraching in a Networked Collection of files

    0 out of 5
    4,500

    Signature Seraching in a Networked Collection of files Abstract?Signature Seraching in a Networked Collection of files. A signature is a data pattern of interest in a large data file or set of large data files. Such signatures that need to be found arise in applications such as DNA sequence analysis, network intrusion detection, biometrics, <...

  • Silhouette Analysis-Based Gait Recognition for Human Identification

    Silhouette Analysis-Based Gait Recognition for Human Identification

    0 out of 5
    4,500

    Silhouette Analysis-Based Gait Recognition for Human Identification   Abstract? Silhouette Analysis-Based Gait Recognition for Human Identification Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice…

  • Similarity Measure Selection for Clustering Time Series Databases

    Similarity Measure Selection for Clustering Time Series Databases

    0 out of 5
    4,500

    Similarity Measure Selection for Clustering Time Series Databases Abstract? Similarity Measure Selection for Clustering Time. Series Databases Clustering has become a popular task associated with time series. The choice of a suitable distance measure is crucial to the clustering process and, given the vast number of distance measures for time series available in the literature…

  • Simpler, Faster, More Accurate Melanocytic Lesion Segmentation Through MEDS

    Simpler, Faster, More Accurate Melanocytic Lesion Segmentation Through MEDS

    0 out of 5
    4,500

    Simpler, Faster, More Accurate Melanocytic Lesion Segmentation Through MEDS Abstract?Simpler, Faster, More Accurate Melanocytic Lesion Segmentation Through MEDS. We present a new technique for melanocytic lesion < Final Year Projects > segmentation, Mimicking Expert Dermatologists’ Segmentations (MEDS), and extensive tests of its accuracy, speed, and robustness. MEDS combines a thresholding scheme reproducing the cognitive process…

  • Single-Ended 9T SRAM Cell for Near-Threshold Voltage Operation With Enhanced Read Performance in 22-nm FinFET Technology

    Single-Ended 9T SRAM Cell for Near-Threshold Voltage Operation With Enhanced Read Performance in 22-nm FinFET Technology

    0 out of 5
    4,500

    Single-Ended 9T SRAM Cell for Near-Threshold Voltage Operation With Enhanced Read Performance in 22-nm FinFET Technology Abstract? Single-Ended 9T SRAM Cell for Near-Threshold Voltage Operation With Enhanced Read Performance in 22-nm FinFET Technology. Although near-threshold(Vth)operation is an attractive method for energy and performance-constrained applications,it suffers from problems in terms of circuit stability, particularly,for static random…

  • Single-Image Super-Resolution via Linear Mappingof Interpolated Self-Examples

    Single-Image Super-Resolution via Linear Mappingof Interpolated Self-Examples

    0 out of 5
    4,500

    Single-Image Super-Resolution via Linear Mappingof Interpolated Self-Examples Abstract?Single-Image Super-Resolution via Linear Mappingof Interpolated Self-Examples. This paper presents a novel example-based single-image superresolution procedure that upscales to high-resolution (HR) a given low-resolution (LR) input image without relying on an external dictionary of image examples. The dictionary instead is built from the LR input image itself, by…

End of content

End of content