Showing 565–576 of 1966 results

  • Copyright Protection for E-Government Document Images

    0 out of 5
    4,500

    Copyright Protection for E-Government Document Images   Abstract?The proposed copyright protection scheme combines the discrete cosine transform (DCT) and singular value decomposition (SVD) using a control parameter to avoid the false-positive problem. In this article, we propose an efficient copyright protection scheme for e-government document images. First, we apply the discrete cosine transform (DCT) to…

  • CORDIC Designs for Fixed Angle of Rotation

    0 out of 5
    4,500

    CORDIC Designs for Fixed Angle of Rotation Abstract? CORDIC Designs for Fixed Angle of Rotation. Rotation of vectors through fixed and known angles has wide applications in robotics, digital signal processing, graphics, games, and animation. But, we do not find any optimized coordinate rotation digital computer (CORDIC) design for vector-rotation through specific angles. Therefore, in…

  • Corruptive Artifacts Suppression for Example – Based Color Transfer

    0 out of 5
    4,500

    Corruptive Artifacts Suppression for Example – Based Color Transfer Abstract?Corruptive Artifacts Suppression for Example – Based Color Transfer. Example-based color transfer is a critical operation in image editing but easily suffers from some corruptive artifacts in the mapping process. In this paper, we propose a novel unified color transfer framework with corruptive artifacts suppression, which…

  • Cortical Surface Reconstruction via Unified Reeb Analysis of Geometric and Topological Outliers in Magnetic Resonance Images

    0 out of 5
    4,500

    Cortical Surface Reconstruction via Unified Reeb Analysis of Geometric and Topological Outliers in Magnetic Resonance Images Abstract?we present a novel system for the automated reconstruction of cortical surfaces from T1-weighted magnetic resonance images. At the core of our system is a unified Reeb analysis framework for the detection and removal of geometric and topological outliers…

  • Placeholder

    COSAC: A Framework for Combinatorial Statistical Analysis on Cloud.

    0 out of 5
    4,500

    COSAC: A Framework for Combinatorial Statistical Analysis on Cloud. Abstract?COSAC: A Framework for Combinatorial Statistical Analysis on Cloud. In many scientific applications, it is critical to determine if there is a relationship between a combination of objects. The strength of such an association is typically computed using some statistical measures. In order not to miss…

  • Cost minimization and loss minimization based transmission network expansion planning with distributed generation penetration.

    0 out of 5
    4,500

    Cost minimization and loss minimization based transmission network expansion planning with distributed generation penetration Abstract?Cost minimization and loss minimization based transmission network expansion planning with distributed generation penetration At present, large electrical undergoes stability problems due to unexpected events such as storms, earthquakes, acts of terrorism etc. Power system operation may close to its stability…

  • Cost Minimization of Big Data Processing for Geo Distributed Data Center

    0 out of 5
    4,500

    Cost Minimization of Big Data Processing for Geo Distributed Data Center Abstract?The explosive growth of demands on big data processing imposes a heavy burden on computation, storage, and communication in data centers, which hence incurs considerable operational expenditure to data center providers. Therefore, cost minimization has become an emergent issue for the upcoming big data…

  • Cost Optimization of Elasticity Cloud Resource Subscription Policy

    0 out of 5
    4,500

    Cost Optimization of Elasticity Cloud Resource Subscription Policy   Abstract? In cloud computing, resource subscription is an important procedure which enables customers to elastically subscribe to IT resources based on their service requirements. Resource subscription can be divided into two categories, namely long-term reservation and on-demand subscription. Although customers need to pay the upfront fee…

  • Cost-Based Optimization of Service Compositions

    0 out of 5
    3,500

    Cost-Based Optimization of Service Compositions   Abstract? Cost-Based Optimization of Service Compositions. For providers of composite services, preventing cases of SLA violations is crucial. Previous work has established runtime adaptation of compositions as a promising tool to achieve SLA conformance. However, to get a realistic and complete view of the decision process of service providers,…

  • Cost-Based Optimization of Service Compositions

    0 out of 5
    4,500

    Cost-Based Optimization of Service Compositions   Abstract? Cost-Based Optimization of Service Compositions. For providers of composite services, preventing cases of SLA violations is crucial. Previous work has established runtime adaptation of compositions as a promising tool to achieve SLA conformance. However, to get a realistic and complete view of the decision process of service providers,…

  • Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

    0 out of 5
    4,500

    Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Abstract? Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on the shared data provides an array of bene?ts to both the society and individuals.< Final Year Projects 2016 >…

  • Cost-Effective Resource Provisioning for MapReduce in a Cloud

    0 out of 5
    4,500

    Cost-Effective Resource Provisioning for MapReduce in a Cloud Abstract?Cost-Effective Resource Provisioning for MapReduce in a Cloud. Presents a new MapReduce cloud service model, Cura, for provisioning cost-effective MapReduce services in a cloud. In contrast to existing < Final Year Projects 2016 > MapReduce cloud services such as a generic compute cloud or a dedicated MapReduce…

End of content

End of content