Showing 3625–3636 of 3871 results

  • Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management

    Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management

    0 out of 5
    3,500

    Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management Abstract? Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management. Distributed mobility management DMM is a promising technology to address the mobile data traf?c explosion problem. Since the location information of mobile < Final Year Project 2016 > nodes (MNs)…

  • Timing Error Tolerance in Small Core Designs for SoC Applications

    Timing Error Tolerance in Small Core Designs for SoC Applications

    0 out of 5
    5,500

    Timing Error Tolerance in Small Core Designs for SoC Applications Abstract? Timing errors are an increasing reliability concern in nanometer technology, high complexity and multi-voltage/frequency integrated circuits. A local error detection and correction technique is presented in this work that is based on a new bit flipping flip-flop. Whenever a timing error is detected, it…

  • TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

    TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

    0 out of 5
    4,500

    TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Abstract? TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage. Attribute-based Encryption (ABE) is regarded as a promising cryptographic conducting tool to guarantee data owners? direct control over their data in public cloud storage. The earlier…

  • To improve Blood Donation Process using Data Mining Techniques

    To improve Blood Donation Process using Data Mining Techniques

    0 out of 5
    4,500

    To improve Blood Donation Process using Data Mining Techniques Abstract? To improve Blood Donation Process using Data Mining Techniques. Blood is the vital thing for human being because there is no alternative for replacing it. This makes it necessary for the presence of a system for predicting continuous behavior of healthy blood donors in blood…

  • To Increase the Data Confidentiality under Exposing of Secret Keys with revocable Access

    To Increase the Data Confidentiality under Exposing of Secret Keys with revocable Access

    0 out of 5
    4,500

    To Increase the Data Confidentiality under Exposing of Secret Keys with revocable Access Abstract– In the first place, describe a new novel cryptography approaches based key management with data storage on cloud server.Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the attacker?s access to the cipher…

  • To Lie or t o Comply: Defending against FloodAttacks in Disruption Tolerant Networks

    To Lie or t o Comply: Defending against FloodAttacks in Disruption Tolerant Networks

    0 out of 5
    4,500

    To Lie or t o Comply: Defending against FloodAttacks in Disruption Tolerant Networks Abstract? To Lie or t o Comply: Defending against FloodAttacks in Disruption Tolerant Networks. For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search…

  • To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model

    To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model

    0 out of 5
    4,500

    To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model Abstract? To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…

  • To Relay or Not to Relay: Learning Device-to-Device Relaying Strategies in Cellular Networks

    To Relay or Not to Relay: Learning Device-to-Device Relaying Strategies in Cellular Networks

    0 out of 5
    5,500

    To Relay or Not to Relay: Learning Device-to-Device Relaying Strategies in Cellular Networks Abstract?We consider a cellular network where mobile transceiver devices that are owned by self-interested users are incentivized to cooperate with each other using tokens, which they exchange electronically to ?buy? and ?sell? downlink relay services, thereby increasing the network?s capacity compared to…

  • Top-k Similarity Join in Heterogeneous Information Networks

    Top-k Similarity Join in Heterogeneous Information Networks

    0 out of 5
    4,500

    Top-k Similarity Join in Heterogeneous Information Networks Abstract? Top-k Similarity Join in Heterogeneous Information Networks. As a newly emerging network model, heterogeneous information networks < Final Year Projects 2016 > have received growing attention. Many data mining tasks have been explored in HINs, including clustering, classi?cation, and similarity search. Similarity join is a fundamental operation…

  • Topic Mining over Asynchronous Text Sequences

    Topic Mining over Asynchronous Text Sequences

    0 out of 5
    4,500

    Topic Mining over Asynchronous Text Sequences Abstract? Topic Mining over Asynchronous Text Sequences. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On…

  • Topic Model for Graph Mining

    Topic Model for Graph Mining

    0 out of 5
    4,500

    Topic Model for Graph Mining Abstract? Topic Model for Graph Mining. Graph mining has been a popular research area because of its numerous application scenarios. Many unstructured and structured data can be represented as graphs, such as, documents, chemical molecular structures, and images. However, an issue in relation to current research on graphs is that…

  • Topic-Sensitive Influencer Mining in Interest-Based Social Media Networks via Hypergraph Learning

    Topic-Sensitive Influencer Mining in Interest-Based Social Media Networks via Hypergraph Learning

    0 out of 5
    4,500

    Topic-Sensitive Influencer Mining in Interest-Based Social Media Networks via Hypergraph Learning Abstract?Topic-Sensitive Influencer Mining in Interest-Based. Social Media Networks via Hypergraph Learning, Social media is emerging as a new mainstream means of interacting around online media. Social influence mining in social networks is therefore of critical importance in real-world applications such as friend suggestion and…

End of content

End of content