Showing 3349–3360 of 3871 results

  • Sentiment analysis: from opinion mining to human-agent interaction

    Sentiment analysis: from opinion mining to human-agent interaction

    0 out of 5
    4,500

    Self-Sentiment analysis: from opinion mining to human-agent interaction AbstractSelf-Sentiment analysis: from opinion mining to human-agent interaction. The opinion mining and human-agent interaction communities are currently addressing sentiment analysis from different perspectives that comprise, on the one hand, disparate sentiment-related phenomena and computational representations, and on the other hand, different detection and dialog management methods. In…

  • Sentiview:Analysis on internet famous topics

    Sentiview:Analysis on internet famous topics

    0 out of 5
    4,500

    Sentiview:Analysis on internet famous topics Abstract?There would be value to several domains in discovering and visualizing sentiments in online posts. This paper presents SentiView, an interactive visualization system that aims to analyze public sentiments for popular topics on the Internet. SentiView combines uncertainty modeling and model-driven adjustment. By searching and correlating frequent words in text…

  • Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm

    Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm

    0 out of 5
    4,500

    Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm Abstract? Steganography basically was defined for the sending secrets message which hides in the image. The secrets message transmitted from one user to another user safely. In the previous system of hiding data in image uses the AES algorithm and Lossy…

  • Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique

    Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique

    0 out of 5
    4,500

    Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique Abstract?The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous work we proposed separable and reversible encrypted data hiding in encrypted image using AES Algorithm…

  • SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices

    SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices

    0 out of 5
    4,500

    SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices Abstract? Credit card fraud is a common problem in today?s world. Financial institutions have registered major loses till today due to users being exposed of their credit card information. Shoulder-sur?ng or observation attacks, including card skimming and video recording with hidden cameras while users perform PIN-based…

  • Sequence Pattern Mining with Variables

    Sequence Pattern Mining with Variables

    0 out of 5
    4,500

    Sequence Pattern Mining with Variables Abstract-Sequence pattern mining (SPM) seeks to find multiple items that commonly occur together in a specific order. One common assumption is that the relevant differences between items are captured through creating distinct items. In some domains, this leads to an exponential increase in the number of items. This paper presents…

  • Sequence-Growth : A Scalable and Effective Frequent Itemset Mining Algorithm for Big Data Based on MapReduce Framework

    Sequence-Growth : A Scalable and Effective Frequent Itemset Mining Algorithm for Big Data Based on MapReduce Framework

    0 out of 5
    4,500

    Sequence-Growth : A Scalable and Effective Frequent Itemset Mining Algorithm for Big Data Based on MapReduce Framework Abstract? Frequent itemset mining FIM < Final Year Projects 2016 > is an important research topic because it is widely applied in real world to ?nd the frequent itemsets and to mine human behavior patterns. FIM process is…

  • Sequential Clustering for Anonymizing Social Networks

    Sequential Clustering for Anonymizing Social Networks

    0 out of 5
    4,500

    Sequential Clustering for Anonymizing Social Networks Abstract-The main contributions in this paper are sequential clustering algorithm for anonymizing a social network and a measure that quantifies the information loss in the anonymization process to preserve privacy. The algorithm significantly outperforms the SaNGreeA algorithm due to Campan and Truta which is the leading algorithm for achieving…

  • Service Class Resource Management for Green Wireless-Optical Broadband Access Networks (WOBAN)

    Service Class Resource Management for Green Wireless-Optical Broadband Access Networks (WOBAN)

    0 out of 5
    4,500

    Service Class Resource Management for Green Wireless-Optical Broadband Access Networks (WOBAN) Abstract? Service Class Resource Management for Green Wireless-Optical Broadband Access Networks. Exponential growth in the volume of wireless data, boosted by the growing popularity of mobile devices, such as smart- phone and tablets, has forced the telecommunication industries to rethink the way networks are…

  • Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds

    Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds

    0 out of 5
    4,500

    Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds Abstract?A service operator-aware trust scheme SOTS for resource matchmaking across < Final Year Projects 2016 > multiple clouds. Through analyzing the built-in relationship between the users, the broker, and the service resources, this paper proposes a middleware framework of trust management that can effectively reduces…

  • Service-generated Big Data and Big Data-as-a-Service: An Overview

    Service-generated Big Data and Big Data-as-a-Service: An Overview

    0 out of 5
    4,500

    Service-generated Big Data and Big Data-as-a-Service: An Overview Abstract?The prevalence of service computing and cloud computing, more and more services are emerging on the Internet, generating huge volume of data, such as trace logs, QoS information, service relationship, etc. The overwhelming service-generated data become too large and complex difficult < Final Year Projects 2016 >…

  • Set Matching Measures for External Cluster Validity

    Set Matching Measures for External Cluster Validity

    0 out of 5
    5,500

    Set Matching Measures for External Cluster Validity Abstract? Comparing two clustering results of a data set is a challenging task in cluster analysis. Many external validity measures have been proposed in the literature. A good measure should be invariant to the changes of data size, cluster size and number of clusters. We give an overview…

End of content

End of content