Set Matching Measures for External Cluster Validity Abstract? Comparing two clustering results of a data set is a challenging task in cluster analysis. Many external validity measures have been proposed in the literature. A good measure should be invariant to the changes of data size, cluster size and number of clusters. We give an overview…
Set predicates in sql:Enabling set-level comparisons for dynamically formed groups Abstract?Set predicates in sql:Enabling set-level comparisons for dynamically formed groups. In data warehousing and OLAP applications, scalar-level predicates in SQL become increasingly inadequate to support a class of operations that require set-level comparison semantics, i.e., comparing a group of tuples with multiple values. Currently, complex…
Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis Abstract-With the proliferation of websites, the security level of password-protected accounts is no longer purely determined by individual ones. Users may register multiple accounts on the same site or across multiple sites, and these passwords from the same users are likely to be the same…
Shape Similarity Analysis by Self-Tuning Locally Constrained Mixed-Diffusion Abstract?Similarity analysis is a powerful tool for shape matching/retrieval and other computer vision tasks. In the literature, various shape (dis)similarity measures have been introduced. Different measures specialize on different aspects of the data. < Final Year Projects > In this paper, we consider the problem of…
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Abstract? Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. Cloud computing is an emerging data interactive paradigm to realize users? data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the…
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Abstract? Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. Cloud computing is an emerging data interactive paradigm to realize users? data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the…
Sharing of Patient confidential data using ECG steganography Abstract?Sharing of Patient confidential data using ECG steganography. The number of aging population are growing significantly. In accordance with Health Insurance Portability and Accountability Act (HIPAA) the patient’s privacy and security is important in the protection of healthcare privacy. Point-Of-care (PoC) is an application used in hospitals…
Shield: A Reliable Network-on-Chip Router Architecture for Chip Multiprocessors Abstract? The increasing number of cores on a chip has made the network on chip (NoC) concept the standard communication paradigm for chip multiprocessors. A fault in an NoC leads to undesirable ramifications that can severely impact the performance of a chip. Therefore, it is vital…
Ship Detection From Optical Satellite Images Based on Saliency Segmentation and Structure-LBP Feature Abstract-In the first place, automatic ship detection from optical satellite imagery is a challenging task due to cluttered scenes and variability in ship sizes. In the same way, a detection algorithm based on saliency segmentation and the local binary pattern (LBP) descriptor…
Signature Seraching in a Networked Collection of files Abstract?Signature Seraching in a Networked Collection of files. A signature is a data pattern of interest in a large data file or set of large data files. Such signatures that need to be found arise in applications such as DNA sequence analysis, network intrusion detection, biometrics, <...