Search
Now showing items 311-320 of 606
Remote Patient Monitoring using Health Bands with Activity Level Prescription
(2016-12-19)
With the advent of new commercially available consumer grade fitness and
health devices, it is now possible and very common for users to obtain, store, share and learn about some of their important physiological metrics ...
MACHINE LEARNING BASED DATACENTER MONITORING FRAMEWORK
(2016-12-09)
Monitoring the health of large data centers is a major concern with the ever-increasing demand of grid/cloud computing and the higher need of computational power. In a High Performance Computing (HPC) environment, the need ...
SLICING ALGORITHM FOR COMPLEX CONTOUR GENERATION FROM COARSE MESHED ISO-SURFACE DATA
(2016-12-20)
Finite element based topology optimization is used to develop complex geometric configurations for additive manufacturing. Complex coarse-meshed Iso-surface data is extracted from topology optimization results and smooth ...
LINCHPIN: A YAML TEMPLATE BASED CROSS CLOUD RESOURCE PROVISIONING TOOL
(2016-12-09)
A cloud application developed, will have a specific requirement of particular cloud resources and software stack to be deployed to make it run. Resource templates enable the environment design and deployment required for ...
Predicting Human Behavior Based on Survey Response Patterns Using Markov and Hidden Markov Models
(2016-12-09)
With technological advancements in World Wide Web (www), connecting with people for gathering information has become common. Among several ways, surveys are one of the most commonly used way of collecting information from ...
EVALUATION OF HTML TAG SUSCEPTIBILITY TO STATISTICAL FINGERPRINTING FOR USE IN CENSORSHIP EVASION
(2016-12-08)
The ability to speak freely has always been a source of conflict between rulers and the people over which they exert power. This conflict usually takes the form of State-sponsored censorship with occasional instances of ...
Improving Memorization and Long Term Recall of System Assigned Passwords
(2016-12-20)
Systems assigned password have guaranteed robustness against guessing attacks, but they are hard to memorize. To make system assigned passwords more usable, it is of prime importance that systems that assign random password ...
MAVROOMIE: AN END-TO-END ARCHITECTURE FOR FINDING COMPATIBLE ROOMMATES BASED ON USER PREFERENCES
(2016-12-07)
Team Formation is widely studied in literature as a method for forming teams or groups under certain constraints. However, very few works address the aspect of collaboration while forming groups under certain constraints. ...
INTEGRATION OF APACHE MRQL QUERY LANGUAGE WITH APACHE STORM REALTIME COMPUTATIONAL SYSTEM
(2016-12-02)
The use of real time processing of data has increased in recent years with the increase of data captured by social media platforms, IOT and other big data applications. The processing of data in real time has been an ...
Searching and Classifying Mobile Application Screenshots
(2016-12-16)
Searching for a particular application layout image is a challenging task. No search provider gives an adequate method to filter the query results to the look of a mobile application. Searching for a particular style of ...