Custmer Relationship in Banks Abstract? Custmer Relationship in Banks. In this paper, taking companies listed on China’s GEM (Growth Enterprises Market) as samples from 2012 to 2014, we test the role of corporate governance in bank credit decision. By examining the influence of corporate governance on bank loan financing capacity, we found that corporate governance…
Customizable Point-of-Interest Queries in Road Networks Abstract?Customizable Point-of-Interest Queries in Road Networks. We present a unified framework for dealing with exact point-of-interest < Final Year Projects 2016 > POI queries in dynamic continental road networks within interactive applications.We show that partition-based algorithms developed for point-to-point shortest path computations can be naturally extended to handle augmented…
Customized computer-aided application mapping on NoC infrastructure using multi-objective optimization Abstract? Customized computer-aided application mapping on NoC infrastructure using multi-objective optimization. Network-on-chip (NoC) are considered the next generation of communication infrastructure, which will be omnipresent in most of industry, office and personal electronic systems. In the platform-based methodology, < Final Year Projects > an application…
Customized Policies for Handling Partial Information in Relational Databases Abstract?Most real-world databases have at least some missing data. Today, users of such databases are ?on their own? in terms of how they manage this incompleteness. In this paper, we propose the general concept of partial information policy (PIP) operator to handle incompleteness in relational databases.<...
Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Abstract?A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots…
DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks Abstract?DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks. Data uploading time constitutes a large portion of mobile data gathering time in wireless sensor networks.By equipping < Final Year Projects 2016 > multipleantennas on the mobile…
DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party Abstract?Off-site data storage is an application of cloud that relieves the customers from focusing on data storage system. However, outsourcing data to a third-party administrative control entails serious security concerns. Data leakage may occur due to attacks by other users and machines in the cloud….
DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party Abstract?Off-site data storage is an application of cloud that relieves the customers from focusing on data storage system. However, outsourcing data to a third-party administrative control entails serious security concerns. Data leakage may occur due to attacks by other users and machines in the cloud….
Data as a Currency and Cloud-Based Data Lockers Abstract? Monetization strategies that are apparent to consumers include virtual goods, in-app purchases, and advertising-supported models, as the increasing number of pop-ups, pop-unders, banners, mobile, text-based, in-game, and other ad types makes clear. Such ads can be used not only to sell products and services directly, but…
Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling Abstract? Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling. We study data collection in an energy renewable sensor network for scenarios such as traffic monitoring on busy highways, where sensors are deployed along a predefined path < Final Year Projects 2016 > the…
Data Encoding Techniques for Reducing Energy Consumption in Network-on-Chip Abstract?Data Encoding Techniques for Reducing Energy Consumption in Network-on-Chip As technology shrinks, the power dissipated by the links of a network-on-chip (NoC) starts to compete with the power dissipated by the other elements of the communication subsystem, namely, the routers and the network interfaces (NIs). <...
Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution Abstract?Digital video sometimes needs to be stored and processed in an encrypted format to maintain security and privacy. For the purpose of content notation and/or tampering detection, it is necessary to perform data hiding in these encrypted videos. In this way, data hiding in encrypted…