A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold Abstract? Location Based Reminder is a feature in a software program that uses the global positioning system identification to remind the important reminders for the particular locations. Programs that incorporate geo-fencing allow an administrator to set up triggers so when a device enters…
Text Detection and Recognition in Imagery: A Survey Abstract? Text Detection and Recognition in Imagery: A Survey. Analyzes, compares, and contrasts technical challenges, methods, and the performance of text detection and recognition research in color imagery. It summarizes the fundamental problems and enumerates factors that should be considered when addressing these problems. Existing < Final…
SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays Abstract? SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays. Current IEEE 802.11 WLANs suffer from the well-known rate anomaly problem, which can drastically reduce network performance. Opportunistic relaying can address this problem, but three major considerations, typically considered separately by prior work, need to be taken into account for…
Pupil Dynamics for Iris Liveness Detection Abstract? Pupil Dynamics for Iris Liveness Detection. The primary objective of this paper is to propose a complete methodology for eye liveness detection based on pupil dynamics. This method may serve as a component of presentation attack detection in iris recognition systems, making them more secure. Due to a…
SIR: a secure and intelligent routing protocol for vehicular ad hocnetwork Abstract? SIR: a secure and intelligent routing protocol for vehicular ad hocnetwork. Security in routing is an important issue in vehicular ad hoc network < Final Year Projects 2016 > to protect the valuable information. However, this intelligent transportation system (ITS) services provided by…
Service Class Resource Management for Green Wireless-Optical Broadband Access Networks (WOBAN) Abstract? Service Class Resource Management for Green Wireless-Optical Broadband Access Networks. Exponential growth in the volume of wireless data, boosted by the growing popularity of mobile devices, such as smart- phone and tablets, has forced the telecommunication industries to rethink the way networks are…
Securing Cognitive Radio Networks against Primary User Emulation Attacks Abstract? Securing Cognitive Radio Networks against Primary User Emulation Attacks. Securing Cognitive Radio Networks against Primary User Emulation Attacks. Cognitive Radio (CR) is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for…
A Survey on Blood Vessel detection Methodologies in Retinal Images Abstract? Automatic detection of the blood vessels in retinal images is a challenging task. A survey has been made to help biomedical engineers and medical physicists. Here we have taken three different methods for blood vessels segmentation, method (a) a novel method to segment the…
Sum capacity maximization for MIMO?OFDMA based cognitive radio networks Abstract? Sum capacity maximization for MIMO?OFDMA based cognitive radio networks. In the opportunistic Cognitive Radio (CR) networks, the secondary users? (SU) capacity is limited due to the need to avoid the primary users? (PUs) bands. The combination of the Multiple-Input Multiple-Output (MIMO) structure with the orthogonal…
Geo-Fencing: Geographical-Fencing based Energy-Aware Proactive Framework for Mobile Devices Abstract?Location-based services (LBSs) are often based on an area or place as opposed to an accurate determination of the precise location. However, current mobile software frameworks are geared towards using speci?c hardware devices (e.g., GPS or 3G or Wi-Fi interfaces) for as precise localization as possible…
Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm Abstract? A peer-to-peer system, a node should estimate reputation of other peers not only on the basis of its own interaction, but also on the basis of expression of other nodes. Reputation aggregation mechanism implements strategy for achieving this. Reputation aggregation in peer to peer networks…
Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm Abstract? Steganography basically was defined for the sending secrets message which hides in the image. The secrets message transmitted from one user to another user safely. In the previous system of hiding data in image uses the AES algorithm and Lossy…
Relevance Feature Discovery for Text Mining Abstract? A big challenge to guarantee the quality of discovered relevance features in text documents for describing user preferences because of large scale terms and data patterns. Most existing popular text mining and classi?cation methods have adopted term-based approaches. However, they have all suffered from the problems of polysemy…
QoS-aware Node Selection Algorithm for Routing Protocols in VANETs Abstract?A QoS-Aware node Selection Algorithm (QASA) for routing protocols to be suitable for a particular class of opportunistic networks, when applied to the Vehicular Ad hoc Networks. Our algorithm aims to select the next-hop vehicle to communicate with, by exploiting the ?bridging approach? for message forwarding…
Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data Abstract-Crowdsourcing is a process of acquisition,integration,and analysis of big and heterogeneous data generated by a diversity of sources in urban spaces, such as sensors, devices,vehicles, buildings, and human. Especially, nowadays, no countries, no communities, and no person are immune to urban emergency events….
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage Abstract-Temporary keyword search on con?dential data in a cloud environment is the main focus of this research. The cloud providers are not fully trusted. So, it is necessary to outsource data in the encrypted form. In the attribute-based keyword search (ABKS) schemes, the authorized…
CSR: Classi?ed Source Routing in DHT-Based Networks Abstract-In recent years cloud computing provides a new way to address the constraints of limited energy, capabilities, and resources. Distributed hash table (DHT) based networks have become increasingly important for ef?cient communication in large-scale cloud systems. Previous studies mainly focus on improving the performance such as latency, scalability…
Collaboratively Tracking Interests for User Clustering in Streams of Short Texts Abstract-In this paper, we aim at tackling the problem of user clustering in the context of their published short text streams. Clustering users by short text streams is more challenging than in the case of long documents associated with them as it is dif?cult…
Data Mining for Patient Friendly Apnea Detection Abstract-Obstructive Sleep Apnea (OSA) is a common, but severely under-diagnosed sleep disorder that affects the natural breathing cycle during sleep with periods of reduced respiration or no air?ow at all. It is our long-term goal to increase the percentage of diagnosed OSA cases and reduce the time to…
Learning Customer Behaviors for Effective Load Forecasting Abstract-Load forecasting has been deeply studied because of its critical role in Smart Grid. In current Smart Grid, there are various types of customers with different energy consumption patterns. Customer?s energy consumption patterns are referred as customer behaviors. It would signi?cantly bene?t load forecasting in a grid if…
Application of Data Mining Techniques in Weather Prediction and Climate Change Studies Abstract-Weather forecasting is a vital application in meteorology and has been one of the most scientifically and technologically challenging problems around the world in the last century. In this paper, we investigate the use of data mining techniques in forecasting maximum temperature, rainfall,…
Time Series Database Preprocessing for Data Mining Using Python Abstract-Database Preprocessing for Data Mining Using Python lays the groundwork for data mining. Before the discovery of useful information/knowledge, the target data set must be properly prepared. Using Data Mining in census data has very high learning value and vast marketplace space. While census data are…
A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection Abstract-Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this…
DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments Abstract-Cloud computing is a revolution in IT technology that provides scalable, virtualized on-demand resources to the end users with greater ?exibility, less maintenance and reduced infrastructure cost. These resources are supervised by different management organizations and provided over Internet using known networking protocols, standards…
Multi-Context Integrated Deep Neural Network Model for Next Location Prediction Abstract-The prediction of next location for users in location-based social networks has become an increasing significant requirement since it can benefit both users and business. However, existing methods lack an integrated analysis of sequence context, input contexts and user preferences in a unified way, and…
Prediction of Heart Disease Using Machine Learning Algorithms Abstract-Heart disease is the one of the most common disease. This disease is quite common now a days we used different attributes which can relate to this heart diseases well to find the better method to predict and we also used algorithms for prediction. Naive Bayes, algorithm…
Semi-supervised machine learning approach for DDoS detection Abstract-Even though advanced Machine Learning (ML) techniques have been adopted for DDoS detection, the attack remains a major threat of the Internet. Most of the existing ML-based DDoS detection approaches are under two categories: supervised and unsupervised. Supervised ML approaches for DDoS detection rely on availability of labeled…
Stocks Market Prediction Using Support Vector Machine Abstract-A lot of studies provide strong evidence that traditional predictive regression models face significant challenges in out-of sample predictability tests due to model uncertainty and parameter instability. Recent studies introduce particular strategies that overcome these problems. Support Vector Machine (SVM) is a relatively new learning algorithm that has…
Secure Sensitive Data Sharing on a Big Data Platform Abstract? Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic. This paper proposes a framework for secure…
A 900-MHz, 3.5-mW, 8-bit Pipelined Subranging ADC Combining Flash ADC and TDC Abstract-In this paper, we propose a time-based analog-to digital converter (ADC) architecture combining a ?ash ADC and vernier time-to-digital converter (TDC) to achieve both high speed and high resolution. The ?ash ADC and vernier TDC are pipelined to increase the conversion speed. A…
Low-Power and Fast Full Adder by Exploring New XOR and XNOR Gates Abstract-In this paper, novel circuits for XOR/XNOR and simultaneous XOR?XNOR functions are proposed. The proposed circuits are highly optimized in terms of the power consumption and delay, which are due to low output capacitance and low short-circuit power dissipation. We also propose six…
An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation Abstract-To achieve the goal of secure communication,cryptography is an essential operation. Many applications, including health-monitoring and biometric data based recognition system, need short-term data security. To design short-term security based applications, there is an essential need of high-performance, low cost and area-efficient VLSI…
Low Power Address Generator for Memory Built-In Self Test Abstract-Memory is one of the basic computer components that is intensively accessed. Therefore, it is more likely to be affected by manufacturing faults rather than other components in the System on Chip (SoC). Memory Built-in Self Test (MBIST) is the most commonly used to test embedded…
A Low Area Overhead NBTI/PBTI Sensor for SRAM Memories Abstract-Bias temperature instability (BTI) is known as one serious reliability concern in nanoscale technologies. BTI gradually increases the absolute value of threshold voltage (Vth) of MOS transistors. The main consequence of Vth shift of the SRAM cell transistors is the static noise margin (SNM) degradation. The…
Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding Abstract-Globalization of microchip fabrication opens the possibility for an attacker to insert hardware Trojans into a chip during the manufacturing process. While most defensive methods focus on detection or prevention, a recent method, called Randomized Encoding of Combinational Logic for…
A Low-Power High-Speed Accuracy-Controllable Approximate Multiplier Design Abstract-Multiplication is a key fundamental function for many error-tolerant applications. Approximate multiplication is considered to be an efficient technique for trading off energy against performance and accuracy. This paper proposes an accuracy-controllable multiplier whose final product is generated by a carry-maskable adder. The proposed scheme can dynamically select…
Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection Abstract?An intrusion detection system (IDS) for vehicular adhoc networks (VANETs) is proposed and evaluated. The IDS is evaluated by simulation in the presence of rogue nodes (RNs) that can launch different attacks. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ]…
Generating Correlated Digital Certificates: Framework and Applications Abstract? Bolstering public key authentication of networking entities, digital certificates are an entrenched part of Internet security. A digital certificate is an electronic document signed by a certificate authority (CA), vouching that the identified subject owns the declared public key (and the corresponding private key). In general, CAs…
R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks Abstract?Abstract Providing reliable and efficient communication under fading channels is one of the major technical challenges in wireless sensor networks (WSNs), especially in industrial WSNs (IWSNs) with dynamic and harsh environments. In this work,we present the Reliable Reactive Routing Enhancement (R3E) to increase the resilience to…
Enhancing Heart-Beat-Based Security for mHealth Applications Abstract-In heart-beat-based security, a security key is derived from the time difference between two consecutive heart beats (the Inter-Pulse-Interval, IPI) which may, subsequently, be used to enable secure communication. While heart-beatbased security holds promise in mobile health (mHealth) applications, there currently exists no work that provides a detailed characterization…
Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks Abstract?Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks. Delay Tolerant Network < Final Year Projects 2016 > DTN is developed to cope with intermittent connectivity and long delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to black hole and…
Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks Abstract? Mobile ad hoc networks (MANETs) are becoming increasingly common, and typical network loads considered for MANETs are increasing as applications evolve. This, in turn, increases the importance of bandwidth efficiency while maintaining tight requirements on energy consumption, delay and jitter. Coordinated…
An Optimal Scheduling Algorithm for Maximizing Throughput in WiMAX Mesh Networks Abstract? The WiMAX mesh network (WMN) architecture is defined in the IEEE 802.16 standard for increasing network coverage and improving communication performance. In the past few years, several greedy or heuristic algorithms have been proposed to cope with the scheduling problem in WMNs. However,…
Dynamic Spectrum Allocation for the Downlink of OFDMA-Based Hybrid-Access Cognitive Femtocell Networks Abstract?The cognitive femtocell has emerged as an exciting technology to solve the indoor coverage problem in future cellular networks. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…
User-Centric Energy Efficiency Maximization for Wireless Powered Communications Abstract? we consider wireless powered communication networks (WPCNs) where multiple users harvest energy from a dedicated power station and then communicate with an information receiving station in a time-division manner. Thereby, our goal is to maximize the weighted sum of the user energy efficiencies (WSUEEs). In contrast…
Max-Min Fair Resource Allocation for SWIPT in Multi-Group Multicast OFDM Systems Abstract-Simultaneous wireless information and power transfer (SWIPT) is considered for multi-group multicasting OFDM systems. Each user has the energy harvesting capability through a power splitter (PS). The power and subcarrier allocation at the base station is done such that the minimum signal-to-noise ratio (SNR)…
Hierarchical Cluster-based Routing in Wireless Sensor Networks Abstract?Wireless Sensor Network (WSN) is a collection of wireless sensor nodes forming a temporary network without the aid of any established infrastructure or centralized administration. In the recent years many researchers are investigating the routing protocols in WSNs and proposed the different routing schemes based on the network…
Achieving Arbitrary Multiplexing Rates for MIMO-OFDM Systems by Mimo-OFDM Systems by Hybrid Cyclic Delay Diversity Abstract?A new hybrid cyclic delay diversity (HCDD) scheme for multiple input multiple output (MIMO) orthogonal frequency division multiplexing (OFDM) systems. Unlike the existing double space time transmit diversity (DSTTD) and stacked cyclic delay diversity (SCDD) schemes that are suitable for…
New Results on Transceiver Design for Two-Hop Amplify-and-Forward MIMO Relay Systems With Direct Link Abstract? Conventional amplify-and-forward (AF) protocol for half-duplex two-hop multiple-input?multiple-output (MIMO) relay systems assumes that the source node transmits the signal only at the first time slot. While making the source node silent at the second time slot simplifies the system design,…
Reducing Pointing Errors in Free-Space Optical Communication Links over Turbulences with a Partially Coherent Gaussian Beam Abstract?Abstract We present joint investigation of the effects of a spatially partially coherent Gaussian beam and aperture averaging on the performance of free-space optical (FSO) communication systems from an information theory perspective. A theoretical model is proposed to determine…
It seems we can’t find what you’re looking for. Perhaps searching can help.
Username or email *Required
Password *Required
Remember me Login
Lost your password?
Don't have an account yet? Sign up
No items in your cart. Go on, fill it up with something you love!