JAVA - Vetri Technology

advertisement
SOFTWARE
DATAMINING
1. Integrating Human Behavior Modeling and Data Mining Techniques to
Predict Human Errors in
Numerical Typing.
2. Network-Based Modeling and Intelligent Data Mining of Social Media for
Improving Care.
3. i2MapReduce: Incremental Map Reduce for Mining Evolving Big Data.
4. RANWAR: Rank-Based Weighted Association Rule Mining From Gene
Expression and Methylation Data.
5. Data Mining of Online Diagnosed Waveforms for Probabilistic Condition
Assessment of SF6Circuit Breakers.
6. Data Mining Framework for Power Quality Event Characterization of Iron
and Steel Plants.
7. Raw Wind Data Pre processing: A Data-Mining Approach.
8. Fast HEVC Encoding Decisions Using Data Mining.
9. A Novel Data-Mining Approach Leveraging Social Media to Monitor
Consumer Opinion of Sitaglipting.
10.Data-Mining-Based Intelligent Differential Relaying for Transmission Lines
Including UPFC and Wind Farms.
11.Data-Mining Model Based Intelligent Differential Micro grid Protection
Scheme.
12. Analyzing Social Roles Based on a Hierarchical Model and Data Mining
for Collective Decision-Making Support.
13.Robust Laser Speckle Authentication System Through Data Mining
Techniques.
14. Sparsity Learning Formulations for Mining Time-Varying Data.
15. Mining the Situation: Spatiotemporal Traffic Prediction with Big Data.
16. Data-Stream-Based Intrusion Detection System for Advanced Metering
Infrastructure in Smart Grid: A Feasibility Study.
17.Efficient Algorithms for Mining the Concise and Lossless Representation of
High Utility Item sets.
18.Data Fusion by Matrix Factorization.
19.Statistical Comparison of Fault Detection Models for Semiconductor
Manufacturing Processes.
20.Predicting the Pro-Longevity or Anti-Longevity Effect of Model Organism
Genes with New Hierarchical Feature Selection Methods.
21.Pipelined Decision Tree Classification Accelerator Implementation in
FPGA (DT-CAIF).
22.An Expert CAD Flow for Incremental Functional Diagnosis of Complex
Electronic Boards.
23.Distributed Multi-Agent Online Learning Based on Global Feedback.
24. CPCDN: Content Delivery Powered by Context and User Intelligence.
25. Nonparametric Regression-Based Failure Rate Model for Electric Power
Equipment Using Lifecycle Data.
26. A Set of Complexity Measures Designed for Applying Meta-Learning to
Instance Selection.
27. The Impact of View Histories on Edit Recommendations.
28. Communication Theoretic Data Analytics.
29. E-Tree: An Efficient Indexing Structure for Ensemble Models on Data
Streams.
CLOUD COMPUTING
1. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile
Cloud Data Through Blind Storage
2. Cost-Effective Authentic and Anonymous Data Sharing with Forward
Security
3. Identity-Based
Encryption
with
Outsourced
Revocation
in
Cloud
Computing
4. Panda Public Auditing for Shared Data with Efficient User Revocation in
the Cloud
5. Performing Initiative Data Prefetching in Distributed File Systems for
Cloud Computing
6. T-broker A Trust-aware Service Brokering Scheme for Multiple Cloud
Collaborative Services
7. A Profit Maximization Scheme with Guaranteed Quality of Service in
Cloud Computing
8. Governance Model for Cloud Computing in Building Information
Management
9. Performing Initiative Data Prefetching in Distributed File Systems for
Cloud Computing
10. Proof of ownership in deduplicated cloud storage with mobile device
efficiency
BIG DATA
1. A Time Efficient Approach for Detecting Errors in Big Sensor Data on
Cloud
2. Research Directions for Engineering Big Data Analytics Software
3. Subspace Learning and Imputation for Streaming Big Data Matrices and
Tensors
4. Privacy-Preserving Cipher text Sharing Mechanism for Big Data Storage
5. Stochastic Decision Making for Adaptive Crowd sourcing in Medical BigData Platforms
6. Predicting Asthma-Related Emergency Department Visits Using Big Data
PARELL DISTRIBUTED
1. Distributed Sensing for High-Quality Structural Health Monitoring Using
WSN.
2. A
Distributed
Fault-Tolerant
Topology
Control
Algorithm
for
Heterogeneous Wireless Sensor Networks.
3. Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center
Networks.
4. Improving the Network Lifetime of MANETs through Cooperative MAC
Protocol Design.
5. Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks.
6. Secrecy Capacity Optimization via Cooperative Relaying and Jamming for
WANETs.
7. Secure and Reliable Routing Protocols for Heterogeneous Multihop
Wireless Networks.
8. Shared Authority Based Privacy-Preserving Authentication Protocol in
Cloud Computing.
9. Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer
Networks.
10. Aggregated-Proof Based Hierarchical Authentication Scheme for the
Internet of Things.
11. Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor
Networks.
12. Decentralized
Computation
Offloading
Game
for
Mobile
Cloud
Computing.
13. Innovative Schemes for Resource Allocation in the Cloud for Media
Streaming Applications.
14. Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing
Algorithm.
15. Secure and Distributed Data Discovery and Dissemination in Wireless
Sensor Networks.
MOBILE COMPUTING
1. Decentralized Computation Offloading Game for Mobile Cloud Computing
2. Joint Cloud and Wireless Networks Operations in Mobile Cloud
Computing Environments with Telecom Operator Cloud.
3. A Multi-Granularity FPGA With Hierarchical Interconnects for Efficient
and Flexible Mobile Computing.
4. Dynamic Operations of Cloud Radio Access Networks(C-RAN) for Mobile
Cloud Computing Systems.
5. Integrated Inertial Sensors and Mobile Computing for Real-Time Cycling
Performance Guidance via Pedaling Profile Classification.
6. Optimal Wideband LPDA Design for Efficient Multimedia Content
Delivery Over Emerging Mobile Computing Systems.
7. Collaborative Task Execution in Mobile Cloud Computing Under a
Stochastic Wireless Channel.
8. Context-Aware QOE Modeling, Measurement, and Prediction in Mobile
Computing Systems.
9. Task Scheduling with Dynamic Voltage and Frequency Scaling for Energy
Minimization in the Mobile Cloud Computing Environment.
10. Rescue Wings: Mobile Computing and Active Services Support for
Disaster Rescue.
11. Quality of Contributed Service and Market Equilibrium for Participatory
Sensing.
12. A Television Channel Real-Time Detector using Smart phones.
13.Joint Scheduling of Tasks and Messages for Energy Minimization in
Interference-Aware Real-Time Sensor Networks.
14.On Learning Navigation Behaviors for Small Mobile Robots With
Reservoir Computing Architectures.
15. Harnessing Technology for Promoting Undergraduate Art Education: A
Novel Model that Streamlines Learning between Classroom, Museum, and
Home.
NETWORKING AND NETWORK SECURITY
1. Security Optimization of Dynamic Networks with Probabilistic Graph
Modeling and Linear Programming.
2. Proposed Security Mechanism for XMPP-Based Communications of
ISO/IEC/IEEE 21451 Sensor Networks.
3. A Survey of Security Attacks in Information-Centric Networking.
4. Relay Selection for Security Enhancement in Cognitive Relay Networks.
5. Physical Layer Network Security in the Full-Duplex Relay System.
6. Security-Aware Relaying Scheme for Cooperative Networks With
Untrusted Relay Nodes.
7. Toward Energy-Efficient Trust System Through Watchdog Optimization
for WSNs.
8. A Practical Wireless Attack on the Connected Car and Security Protocol
for In-Vehicle CAN.
9. A Semantics-Aware Approach to the Automated Network Protocol
Identification.
10.On the Security of Cognitive Radio Networks.
11. Cyber Security Analysis of Power Networks by Hyper graph Cut
Algorithms.
12.VANDER: Efficient Cooperative Watchdog Monitoring for Lossy Wireless
Network Coding.
13. Privacy-Preserving Detection of Sensitive Data Exposure.
14. Passive IP Trace back: Disclosing the Locations of IP Spoofers From Path
Backscatter.
15.Malware Propagation in Large-Scale Networks.
16.LIVE: Lightweight Integrity Verification and Content Access Control for
Named Data Networking.
17. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce.
18. An Efficient and Trustworthy P2P and Social Network Integrated File
Sharing System.
19. A Framework for Secure Computations With Two Non-Colluding Servers
and Multiple Clients, Applied to Recommendations.
20. Detection of Integrity Attacks in Cyber-Physical Critical Infrastructures
Using Ensemble Modeling.
21.Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service
Attacks.
22.Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyber space.
23. MASK-BAN: Movement-Aided Authenticated Secret Key Extraction
Utilizing Channel Characteristics in Body Area Networks.
24.Field Test of Measurement-Device-Independent Quantum Key Distribution.
25. Joint Beam forming and Power Allocation for Secrecy in Peer-to-Peer
Relay Networks.
26.Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels:
A Stochastic Geometry Approach.
IMAGE PROCESSING
1. A Methodology For Visually Lossless
JPEG2000 Compression Of
Monochrome Stereo Images.
2. A Multiscale Wavelet-Based Test For Isotropy Of Random Fields On A
Regular Lattice.
3. A No-Reference Texture Regularity Metric Based On Visual Saliency.
4. A Novel Image Representation Via Local Frequency Analysis For
Illumination Invariant Stereo Matching.
5. A Novel SURE-Based Criterion For Parametric PSF Estimation.
6. A Probabilistic Approach For Color Correction In Image Mosaicking
Applications.
7. A Regularization Approach To Blind Deblurring And Denoising Of QR
Barcodes.
8. A Very Fast Algorithm For Simultaneously Performing ConnectedComponent Labeling And Euler Number Computing.
9. Accurate And Robust Line Segment Extraction Using Minimum Entropy
With Hough Transform.
10. Accurate Vessel Segmentation With Constrained B-Snake.
11. Adaptive Image Denoising By Targeted Databases.
12. Adaptive Regularization With The Structure Tensor.
13. Alternating Direction Method Of Multipliers For Nonlinear Image
Restoration Problems.
14. An Approach Toward Fast Gradient-Based Image Segmentation.
15. An Efficient MRF Embedded Level Set Method For Image Segmentation.
16. An Innovative Lossless Compression Method For Discrete-Color Images.
17. Approximation And Compression With Sparse Orthonormal Transforms.
18. Blind Inpainting Using _0 And Total Variation Regularization.
19. Depth-Preserving Warping For Stereo Image Retargeting.
20. Discriminative Shared Gaussian Processes For Multiview And ViewInvariant Facial Expression Recognition.
21. Disparity Estimation On Stereo Mammograms.
22. Entropy-Based Evaluation Of Context Models For Wavelet-Transformed
Images.
23. Face Recognition Across Non-Uniform Motion Blur, Illumination, And
Pose.
24. Fractal Analysis For Reduced Reference Image Quality Assessment.
25. Full-Reference Quality Assessment Of Stereoscopic Images By Learning
Binocular Receptive Field Properties.
26. Fusing Inertial Sensor Data In An Extended Kalman Filter For 3D Camera
Tracking.
27. High Dynamic Range Image Compression By Optimizing Tone Mapped
Image Quality Index.
28. High-Resolution Face Verification Using Pore-Scale Facial Features.
29. Image
Super-Resolution
Based
On
Structure-Modulated
Sparse
Representation.
30. Learning Compact Feature Descriptor And Adaptive Matching Framework
For Face Recognition.
31. Low-Complexity Topological Derivative-Based Segmentation.
32. Multi-Level Discriminative Dictionary Learning With Application To Large
Scale Image Classification.
33. Multiscale Image Blind Denoising.
34. Multiscale Logarithm Difference Edgemaps For Face Recognition Against
Varying Lighting Conditions.
35. Neighborhood Discriminant Hashing For Large-Scale Image Retrieval.
36. Nonparametric Multiscale Blind Estimation Of Intensity-FrequencyDependent Noise.
37. Panorama View With Spatiotemporal Occlusion Compensation For 3D
Video Coding.
38. Pareto-Depth For Multiple-Query Image Retrieval.
39. PM-PM: Patchmatch With Potts Model For Object Segmentation And
Stereo Matching.
40. Recursive Approximation Of The Bilateral Filter.
41. Robust Representation And Recognition Of Facial Emotions Using Extreme
Sparse Learning.
42. Single Image Superresolution Based On Gradient Profile Sharpness.
43. Steganography Using Reversible Texture Synthesis.
44. Stochastic Blind Motion Deblurring.
45. Template-Free Wavelet-Based Detection Of Local Symmetries.
46. Toward Naturalistic 2D-To-3D Conversion.
47. Undersampled Face Recognition Via Robust Auxiliary Dictionary
Learning.
Download