Search
Products meeting the search criteria
Context-Aware Verifiable Cloud Computing
Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the dat..
EGC MONITORING SYSTEM USING ANDROID
The Electrocardiogram (ECG) is an important tool to interpret a wide range of heart conditions. Earl..
A Classroom Scheduling Service for Smart Classes
The main aim of this project is to make an android app to know the time table of the college for th..
A Cluster-on-a-Chip Architecture for High-Throughput Phylogeny Search
Classification of large datasets is an important data mining problem. Many classification algorithms..
A Collaborative DDoS Defence Framework using Network Function Virtualization
High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one ..
A DATA MINING APPROACH COMBINING K-MEANS CLUSTERING WITH BAGGING NEURAL NETWORK FOR SHORT-TERM WIND POWER FORECASTING
Wind power forecasting (WPF) is significant to guide the dispatching of grid and the production pla..
A family Particle Swarm Optimization based on the family tree
A family tree is a chart representing family relationships in a conventional structure. The concept ..
A MOBILE MAPPING DATA WAREHOUSE FOR EMERGING MOBILE VISION SERVICES
Location Based Reminder is a feature in a software program that uses the global positioning system i..
A Model for Checking Contractual Compliance of Business Interactions
The electronic representation of a contract for a business-to-business (B2B) partnership should be s..
A Novel Algorithm for Cross Level Frequent Pattern Mining in Multidatasets
We consider the problem of discovering association rules between items in a large database of sales ..
A NOVEL EFFICIENT REMOTE DATA POSSESSION CHECKING PROTOCOL IN CLOUD STORAGE
As an important application in cloud computing, cloud storage offers user scalable, flexible, and hi..
A Novel Parallel Scan for Multicore Processors and Its Application in Sparse Matrix-Vector Multiplication
• A novel parallel algorithm for computing the scan operations on x86 multicore processors. • This ..
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
Big sensor data is prevalent in both industry and scientific research applications where the data is..
A Trigger Identification Service for Defending reactive jammer in wsn
During the last decade, Reactive Jamming Attack has emerged as a great security threat to wireless s..
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data
In medical cloud computing, a patient can remotely outsource her medical data to the cloud server. I..