Showing 445–456 of 1966 results

  • BURSE: A Bursty andSelf-Similar Workload Generator for Cloud Computing

    0 out of 5
    4,500

    BURSE: A Bursty andSelf-Similar Workload Generator for Cloud Computing Abstract? BURSE: A Bursty andSelf-Similar Workload Generator for Cloud Computing. As two of the most important characteristics of workloads, burstiness and self-similarity are gaining more and more attention. Workload generation, which is a key technique for performance analysis and simulations, has also attracted an increasing interest…

  • By-Passing Infected Areas in Wireless Sensor Networks Using BPR

    0 out of 5
    4,500

    By-Passing Infected Areas in Wireless Sensor Networks Using BPR Abstract? By-Passing Infected Areas in Wireless Sensor Networks Using BPR. Abnormalities in sensed data streams indicate the spread of malicious attacks, hardware failure and software corruption among the different nodes in a wireless sensor network. These factors of node infection can affect generated and incoming data…

  • Byzantine failiure using control zones

    0 out of 5
    4,500

    Byzantine failiure using control zones Abstract?Byzantine failiure using control zones.We consider the problem of reliably broadcasting messages in a network where some nodes are likely to fail. We consider the most general failure model: the Byzantine model, where the failing nodes have an arbitrary behavior, and may actively try to destabilize the network. We focus…

  • CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

    0 out of 5
    4,500

    CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Abstract? Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. < Final Year Project > Unfortunately, it also…

  • CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

    0 out of 5
    4,500

    CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Abstract? CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, < Final Year Projects > has been considered as a revolutionary approach to improving the quality of healthcare service while…

  • Campus automation

    0 out of 5
    3,500

    Campus automation Abstract?Campus automation With the development of digital campus in university, many new requirements to Office Automation (OA) system are put forward. Design of a new OA system based on modern digital campus platform was presented in this paper. The key points between digital campus platform and application system integration technology were discussed in…

  • Cardiac arrhythmias detection in an ECG beat signal using fast fourier transform and artificial neural network

    0 out of 5
    4,500

    Cardiac arrhythmias detection in an ECG beat signal using fast fourier transform and artificial neural network   Abstract?Cardiac Arrhythmias shows a condition of abnor-mal electrical activity in the heart which is a threat to humans. This paper presents a method to analyze electrocardiogram (ECG) signal, extract the fea-tures, for the classification of heart beats according…

  • Cartoon-Texture Image Decomposition Using Blockwise Low-Rank Texture Characterization

    0 out of 5
    4,500

    Cartoon-Texture Image Decomposition Using Blockwise Low-Rank Texture Characterization Abstract?Cartoon-Texture Image Decomposition Using Blockwise Low-Rank Texture Characterization. Using a novel characterization of texture, we propose an image decomposition technique that can effectively decomposes an image into its cartoon and texture components. The characterization rests on our observation that the texture component enjoys a blockwise low-rank nature…

  • cashing in on cloud cache Service

    0 out of 5
    4,500

    cashing in on cloud cache Service Abstract? Over the past decades, caching has become the key technology used for bridging the performance gap across memory hierarchies via temporal or spatial localities; in particular, the effect is prominent in disk storage systems. Applications that involve heavy I/O activities, which are common in the cloud, probably benefit…

  • CCBKE- Session key negotiation for fast and secure scheduling of scientific applications in cloud computing

    0 out of 5
    4,500

    CCBKE- Session key negotiation for fast and secure scheduling of scientific applications in cloud computing   Abstract?Instead of purchasing and maintaining their own computing infrastructure, scientists can now run data-intensive scientific applications in cloud computing environment by facilitating its vast storage and computation capabilities.< Final Year Project > During the scheduling of such scientific applications…

  • CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks

    0 out of 5
    4,500

    CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks   Abstract? wireless sensor networks, data aggregation scheme that reduces a large amount of transmission is the most practical technique. In previous studies, homomorphic encryptions have been applied to conceal communication during aggregation such that enciphered data can be aggregated algebraically without decryption….

  • CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks

    0 out of 5
    4,500

    CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks Abstract? For wireless sensor networks, data aggregation scheme that reduces a large amount of transmission is the most practical technique. In previous studies, homomorphic encryptions have been applied to conceal communication during aggregation such that enciphered data can be aggregated algebraically without decryption….

End of content

End of content