Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution Abstract? Data Hiding in Encrypted H.264/AVC Video Streams by < Final Year Projects 2016 > Codeword Substitution. Digital video sometimes needs to be stored and processed in an encrypted format to maintain security and privacy. For the purpose of content notation and/or tampering detection, it…
Optimizing energy consumption with task consolidation in clouds Data Hiding in Encrypted H.264/AVC VideoStreams by Codeword Substitution Abstract?Digital video sometimes needs to be stored and processed in an encrypted format to maintain security and privacy. For the purpose of content notation and/or tampering detection, it is necessary to perform data hiding in these encrypted videos….
Data Leakage Detection Abstract?Data Leakage Detection. Perturbation is a very useful technique where the data is modified and made ?less sensitive? before being handed to agents. For example, one can add random noise to certain attributes, or one can replace exact values by ranges. However, in some cases it is important not to alter the…
Data Mining for Xml Query-Answering Support Abstract? Extracting information from semistructured documents is a very hard task, and is going to become more and more critical as the amount of digital information available on the Internet grows. Indeed, documents are often so large that the data set returned as answer to a query may be…
Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems Abstract?Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems. Many big-data computing applications have been deployed in cloud platforms. These applications normally demand concurrent data transfers among computing nodes for parallel processing. It is important to find the best transfer…
Data Transmission using Audio Steganography Abstract? Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the attractive solution for this problem is Steganography, which is the art and science of writing hidden messages in such a way that no one, apart from the sender and intend…
Data-Core-Based Fuzzy Min?Max Neural Network for Pattern Classification Abstract?A fuzzy min-max neural network based on data core (DCFMN) is proposed for pattern classification. A new membership function for classifying the neuron of DCFMN is defined in which the noise, the geometric center of the hyperbox, and the data core are considered. Instead of using the…
Data-driven and Feedback-Enhanced Trust Computing Pattern for Large-scale Multi-Cloud Collaborative Services Abstract? Data-driven and Feedback-Enhanced Trust Computing Pattern for Large-scale Multi-Cloud Collaborative Services. Multi-cloud collaborative environment consists of multiple data centers, which is a typical processing platform for big data. This paper focuses on the trust computing requirement of multi-cloud collaborative services and develops a…
DataClouds: Enabling Community-Based Data-Centric Services Over the Internet of Things Abstract?The Internet of Things (IoT) is emerging as one of the major trends for the next evolution of the Internet, where billions of physical objects or things (including but not limited to humans) will be connected over the Internet, and a vast amount of information…
DCloud: Deadline-aware Resource Allocation for Cloud Computing Jobs Abstract?DCloud: Deadline-aware Resource Allocation for Cloud Computing Jobs. The tremendous growth of cloud computing, it is increasingly critical to provide quantifiable performance to tenants and to improve resource utilization for the cloud provider. Though many recent proposals focus on guaranteeing job performance (with a particular note on…
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks Abstract? DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks. A masquerade attacker impersonates a legal user to utilize the user services and privileges. The semi-global alignment algorithm < Final Year Projects 2016 > is one of the most effective and ef?cient techniques to…
Deadline Guaranteed Service for Multi-Tenant Cloud Storage Abstract?Deadline Guaranteed Service for Multi-Tenant Cloud Storage.It is imperative for cloud storage systems to be able to provide deadline guaranteed services according to service level agreements SLAs < Final Year Projects 2016 > for online services. In spite of many previous works on deadline aware solutions, most of…