Showing 385–396 of 451 results

  • RSkNN: kNN Search on Road Networks by Incorporating Social Influence

    RSkNN: kNN Search on Road Networks by Incorporating Social Influence

    0 out of 5
    5,500

    Automatic Attendance Management System Using Face Recognition Abstract? Although kNN search on a road network Gr, i.e., finding k nearest objects to a query user q on Gr, has been extensively studied, existing works neglected the fact that the q?s social information can play an important role in this kNN query. Many real-world applications, such…

  • SanGA: A Self-Adaptive Network-Aware Approach to Service Composition

    SanGA: A Self-Adaptive Network-Aware Approach to Service Composition

    0 out of 5
    4,500

    SanGA: A Self-Adaptive Network-Aware Approach to Service Composition Abstract? SanGA: A Self-Adaptive Network-Aware Approach to Service Composition. Service-Oriented Computing enables the composition of loosely coupled services provided with varying Quality of Service < Final Year Projects 2016 > QoS levels. Selecting a near-optimal set of services for a composition in terms of QoS is crucial…

  • Screen capture utility

    Screen capture utility

    0 out of 5
    4,500

    Screen capture utility   Abstract? Screen capture utility Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On Demand * Remote Connectivity *…

  • Seamless Transition of Three Phase Microgrid with Load Compensation Capabilities

    Seamless Transition of Three Phase Microgrid with Load Compensation Capabilities

    0 out of 5
    4,500

    Seamless Transition of Three Phase Microgrid with Load Compensation Capabilities Abstract-This paper presents the grid synchronization of photovoltaic (PV)-battery based microgrid with multifunctional capabilities. The proposed system is capable to work in the grid integrated mode as well as in islanded mode, based on the grid availability. The objective of this work is a seamless…

  • Secure and Efficient Protocol for Route Optimization in PMIPv6-based Smart Home IoT Networks

    Secure and Efficient Protocol for Route Optimization in PMIPv6-based Smart Home IoT Networks

    0 out of 5
    4,500

    Game Theory Based Correlated Pr ivacy Preser ving Analysis in Big Data Abstract-The communication in the Smart Home Internet of Things (SH-IoT) comprising various electronic devices and sensors is very sensitive and crucial. In addition, the key requirements of SH-IoT include channel security, handover support, mobility management, and consistent data rates. Proxy Mobile IPv6 (PMIPv6)…

  • Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    0 out of 5
    4,500

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture Abstract? Most state-of-the-art binary image steganographic techniques only consider the ?ipping distortion according to the human visual system, which will be not secure when they are attacked by steganalyzers. In this paper, a binary image steganographic scheme that aims to minimize the embedding…

  • Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    0 out of 5
    4,500

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture Abstract? Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture. Most state-of-the-art binary image steganographic techniques only consider the flipping distortion according to the human visual system, which will be not secure when they are attacked by steganalyzers. In this…

  • Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    0 out of 5
    4,500

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks   Abstract?Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by…

  • Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    0 out of 5
    4,500

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Abstract?Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers…

  • Secure file transfer System

    Secure file transfer System

    0 out of 5
    4,500

    Secure file transfer System Abstract?Secure file transfer System. The Iowa Campaign Finance Disclosure project (ICFD) is a pilot effort to develop a simple and secure way for candidates running for public office or Political Action Committees (PACs) to disclose required financial information. In the prototype system described in this paper, a candidate or PAC can…

  • Secure Sensitive Data Sharing on a Big Data Platform

    Secure Sensitive Data Sharing on a Big Data Platform

    0 out of 5
    4,500

    Secure Sensitive Data Sharing on a Big Data Platform Abstract? Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic. This paper proposes a framework for secure…

  • Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks

    Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks

    0 out of 5
    4,500

    Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks Abstract? Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by…

End of content

End of content