Showing 3361–3372 of 3871 results

  • Set Matching Measures for External Cluster Validity

    Set Matching Measures for External Cluster Validity

    0 out of 5
    5,500

    Set Matching Measures for External Cluster Validity Abstract? Comparing two clustering results of a data set is a challenging task in cluster analysis. Many external validity measures have been proposed in the literature. A good measure should be invariant to the changes of data size, cluster size and number of clusters. We give an overview…

  • Set predicates in sql:Enabling set-level comparisons for dynamically formed groups

    Set predicates in sql:Enabling set-level comparisons for dynamically formed groups

    0 out of 5
    4,500

    Set predicates in sql:Enabling set-level comparisons for dynamically formed groups Abstract?Set predicates in sql:Enabling set-level comparisons for dynamically formed groups. In data warehousing and OLAP applications, scalar-level predicates in SQL become increasingly inadequate to support a class of operations that require set-level comparison semantics, i.e., comparing a group of tuples with multiple values. Currently, complex…

  • Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis

    Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis

    0 out of 5
    4,500

    Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis Abstract-With the proliferation of websites, the security level of password-protected accounts is no longer purely determined by individual ones. Users may register multiple accounts on the same site or across multiple sites, and these passwords from the same users are likely to be the same…

  • Shape Similarity Analysis by Self-Tuning Locally Constrained Mixed-Diffusion

    Shape Similarity Analysis by Self-Tuning Locally Constrained Mixed-Diffusion

    0 out of 5
    4,500

    Shape Similarity Analysis by Self-Tuning Locally Constrained Mixed-Diffusion   Abstract?Similarity analysis is a powerful tool for shape matching/retrieval and other computer vision tasks. In the literature, various shape (dis)similarity measures have been introduced. Different measures specialize on different aspects of the data. < Final Year Projects > In this paper, we consider the problem of…

  • Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    0 out of 5
    4,500

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Abstract? Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. Cloud computing is an emerging data interactive paradigm to realize users? data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the…

  • Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    0 out of 5
    4,500

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Abstract? Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. Cloud computing is an emerging data interactive paradigm to realize users? data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the…

  • Sharing of Patient confidential data using ECG steganography

    Sharing of Patient confidential data using ECG steganography

    0 out of 5
    4,500

    Sharing of Patient confidential data using ECG steganography Abstract?Sharing of Patient confidential data using ECG steganography. The number of aging population are growing significantly. In accordance with Health Insurance Portability and Accountability Act (HIPAA) the patient’s privacy and security is important in the protection of healthcare privacy. Point-Of-care (PoC) is an application used in hospitals…

  • Shield: A Reliable Network-on-Chip Router Architecture for Chip Multiprocessors

    Shield: A Reliable Network-on-Chip Router Architecture for Chip Multiprocessors

    0 out of 5
    5,500

    Shield: A Reliable Network-on-Chip Router Architecture for Chip Multiprocessors Abstract? The increasing number of cores on a chip has made the network on chip (NoC) concept the standard communication paradigm for chip multiprocessors. A fault in an NoC leads to undesirable ramifications that can severely impact the performance of a chip. Therefore, it is vital…

  • Ship Detection From Optical Satellite Images Based on Saliency Segmentation and Structure-LBP Feature

    Ship Detection From Optical Satellite Images Based on Saliency Segmentation and Structure-LBP Feature

    0 out of 5
    4,500

    Ship Detection From Optical Satellite Images Based on Saliency Segmentation and Structure-LBP Feature Abstract-In the first place, automatic ship detection from optical satellite imagery is a challenging task due to cluttered scenes and variability in ship sizes. In the same way, a detection algorithm based on saliency segmentation and the local binary pattern (LBP) descriptor…

  • Signature Seraching in a Networked Collection of files

    Signature Seraching in a Networked Collection of files

    0 out of 5
    4,500

    Signature Seraching in a Networked Collection of files Abstract?Signature Seraching in a Networked Collection of files. A signature is a data pattern of interest in a large data file or set of large data files. Such signatures that need to be found arise in applications such as DNA sequence analysis, network intrusion detection, biometrics, <...

  • Silhouette Analysis-Based Action Recognition Via Exploiting Human Poses

    Silhouette Analysis-Based Action Recognition Via Exploiting Human Poses

    0 out of 5
    4,500

    Silhouette Analysis-Based Action Recognition Via Exploiting Human Poses Abstract? Silhouette Analysis-Based Action Recognition Via Exploiting Human Poses. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ]…

  • Silhouette Analysis-Based Gait Recognition for Human Identification

    Silhouette Analysis-Based Gait Recognition for Human Identification

    0 out of 5
    4,500

    Silhouette Analysis-Based Gait Recognition for Human Identification   Abstract? Silhouette Analysis-Based Gait Recognition for Human Identification Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice…

End of content

End of content