Showing 3301–3312 of 3871 results

  • Security-Aware Resource Allocation for Mobile Social Big Data: A Matching-Coalitional Game Solution

    Security-Aware Resource Allocation for Mobile Social Big Data: A Matching-Coalitional Game Solution

    0 out of 5
    4,500

    Security-Aware Resource Allocation for Mobile Social Big Data: A Matching-Coalitional Game Solution Abstract-In the first place, As both the scale of mobile networks and the population of mobile users keep increasing equally important, the applications of mobile social big data have emerged where mobile social users can use their mobile devices to exchange and share…

  • Security, Privacy, and Access Control in Information-Centric Networking: A Survey

    Security, Privacy, and Access Control in Information-Centric Networking: A Survey

    0 out of 5
    4,500

    Security, Privacy, and Access Control in Information-Centric Networking: A Survey Abstract-Information-Centric Networking (ICN) replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet and mobile ad hoc networks) with an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents? origin. Content and client security, provenance, and identity privacy are…

  • SeDas: A Self-Destructing Data System Based on Active Storage Framework

    SeDas: A Self-Destructing Data System Based on Active Storage Framework

    0 out of 5
    4,500

    SeDas: A Self-Destructing Data System Based on Active Storage Framework Abstract? SeDas: A Self-Destructing Data System Based on Active Storage Framework. Personal data stored in the Cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data…

  • SeDaSC: Secure Data Sharing in Clouds

    SeDaSC: Secure Data Sharing in Clouds

    0 out of 5
    4,500

    SeDaSC: Secure Data Sharing in Clouds Abstract? SeDaSC: Secure Data Sharing in Clouds. Cloud storage is an application of clouds that liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. In case of group-shared data, the data face both cloud-speci?c and < Final Year Project 2016 > conventional…

  • SeDaSC: Secure Data Sharing in Clouds

    SeDaSC: Secure Data Sharing in Clouds

    0 out of 5
    4,500

    SeDaSC: Secure Data Sharing in Clouds Abstract? SeDaSC: Secure Data Sharing in Clouds. Cloud storage is an application of clouds that liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. In case of group-shared data, the data face both cloud-specific and conventional insider threats. Secure data sharing among…

  • SEDEX: Scalable Entity Preserving Data Exchange

    SEDEX: Scalable Entity Preserving Data Exchange

    0 out of 5
    5,500

    SEDEX: Scalable Entity Preserving Data Exchange Abstract? Data exchange is the process of generating an instance of a target schema from an instance of a source schema such that source data is reflected in the target. Generally, data exchange is performed using schema mapping, representing high level relations between source and target schemas. < final...

  • SEDEX: Scalable Entity Preserving Data Exchange

    SEDEX: Scalable Entity Preserving Data Exchange

    0 out of 5
    5,500

    SEDEX: Scalable Entity Preserving Data Exchange Abstract? Data exchange is the process of generating an instance of a target schema from an instance of a source schema such that source data is reflected in the target. Generally, data exchnge is performed using schema mapping, representing high level relations between source and target schemas. In this…

  • Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud

    Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud

    0 out of 5
    4,500

    Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud. In cloud computing, data generated in electronic form are large in amount. To maintain this data efficiently, there is a necessity of data recovery services. To cater this, in this paper we propose a smart remote data backup algorithm, Seed Block Algorithm (SBA). The…

  • Segmentation and Tracing of Single Neurons from 3D Confocal Microscope Images

    Segmentation and Tracing of Single Neurons from 3D Confocal Microscope Images

    0 out of 5
    4,500

    Segmentation and Tracing of Single Neurons from 3D Confocal Microscope Images Abstract? Segmentation and Tracing of Single Neurons from 3D Confocal Microscope Images. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections]…

  • Segmentation of Intracranial Vessels and Aneurysmsin Phase Contrast Magnetic Resonance Angiography Using Multirange Filters and Local Variances

    Segmentation of Intracranial Vessels and Aneurysmsin Phase Contrast Magnetic Resonance Angiography Using Multirange Filters and Local Variances

    0 out of 5
    4,500

    Segmentation of Intracranial Vessels and Aneurysmsin Phase Contrast Magnetic Resonance Angiography Using Multirange Filters and Local Variances   Abstract? Segmentation of intensity varying and low-contrast structures is an extremely challenging and rewarding task. In computer-aided diagnosis of intracranial aneurysms, segmenting the high-intensity major vessels along with the attached low-contrast aneurysms is essential to the recognition…

  • Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks

    Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks

    0 out of 5
    4,500

    Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks Abstract? Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks. Robust brain magnetic resonance (MR) segmentation algorithms are critical to analyze tissues and diagnose tumor and edema in a quantitative way. In…

  • Segmentation of Underwater Images Using Different Techniques

    Segmentation of Underwater Images Using Different Techniques

    0 out of 5
    4,500

    Segmentation of Underwater Images Using Different Techniques Abstract? Segmentation of Underwater Images Using Different Techniques. This paper presents a method for the automatic creation of 2D mosaics of the sea floor, using video sequences acquired at different altitudes above the sea floor. The benefit of using different altitude sequences comes from the fact that higher…

End of content

End of content