An Incremental and Distributed Inference Method for Large-Scale Ontologies Based on MapReduce Paradigm Abstract?With the upcoming data deluge of semantic data, the fast growth of ontology bases has brought significant challenges in performing efficient and scalable reasoning. Traditional centralized reasoning methods are not sufficient to process large ontologies. Distributed reasoning methods are thus required to…
An Inference-Based Framework to Manage Data Provenance in Geoscience Applications Abstract? An Inference-Based Framework to Manage Data Provenance in Geoscience Applications. Data provenance allows scientists to validate their model as well as to investigate the origin of an unexpected value. Furthermore, it can be used as a replication recipe for output data products. However, capturing…
An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems Abstract? Recently, a significant amount of interest has been developed in motivating physicians to use e-health technology (especially Electronic Medical Records (EMR) systems). An important utility of such EMR systems is: a next generation of Clinical Decision Support Systems (CDSS) will extract knowledge from…
An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism Abstract?An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism. In this paper, we propose a novel prediction-based reversible steganographic scheme based on image inpainting. First, reference pixels are chosen adaptively according to the distribution characteristics of the image content. Then, the image inpainting…
An Integrated Semantic Web Service Discovery and Composition Framework Abstract? An Integrated Semantic Web Service Discovery and Composition Framework. A theoretical analysis of graph-based service composition in terms of its dependency with service discovery. Driven by this analysis we define a composition framework by means of integration with fine-grained I/O service discovery that enables the…
An Intelligent Economic Approach for Dynamic Resource Allocation in Cloud Services Abstract?With Inter-Cloud, distributed cloud and open cloud exchange < Final Year Projects 2016 > OCX emerging, a comprehensive resource allocation approach is fundamental to highly competitive cloud market. Oriented to infrastructure as a service (IaaS), an intelligent economic approach for dynamic resource allocation (IEDA)…
An Interactive Approach to Multiobjective Clustering of Gene Expression Patterns Abstract? An Interactive Approach to Multiobjective Clustering of Gene Expression Patterns.Some recent studies have posed the problem of data clustering as a multiobjective optimization problem, where several cluster validity indices are simultaneously optimized to obtain tradeoff clustering solutions. A number of cluster validity index measures…
An Interleaved Bi-directional AC-DC Converter with Reduced Switches and Reactive Power Control Abstract-In this paper, a new interleaved AC-DC converter with a reduced number of semiconductor components for high power energy storage applications is proposed. The interleaved structure reduces the AC side current ripple as well as increases the overall current rating. Moreover, the proposed…
An Interleaved Bi-directional AC-DC Converter with Reduced Switches and Reactive Power Control Abstract-In this paper, a new interleaved AC-DC converter with a reduced number of semiconductor components for high power energy storage applications is proposed. The interleaved structure reduces the AC side current ripple as well as increases the overall current rating. Moreover, the proposed…
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques Abstract?Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the pattern as one of the weakest…
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques Abstract? An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques. Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and…