Showing 145–156 of 169 results

  • Staff Attendance System Using Google maps

    0 out of 5
    6,500

    Staff Attendance System Using Google maps Abstract-Now a days mobile phones possess powerful computation and communication capability, and are equipped with various functional builtin sensors. Even the new technologies are arrived in smart phone technology but there is no mechanism is provided for indoor localization. Geo-fencing is the technology which used in global positioning system…

  • STAMP : Enabling Privacy-Preserving Location Proofs for Mobile Users

    0 out of 5
    6,500

    STAMP : Enabling Privacy-Preserving Location Proofs for Mobile Users Abstract?Location-based services are quickly becoming im-mensely popular. In addition to services based on users’ current location,many potential services rely on users’location history,or their spatial-temporal provenance . < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow…

  • Starting Any Applications Via Launcher In Android

    0 out of 5
    6,500

    Starting Any Applications Via Launcher In Android Abstract? Android is a popular, free, open-source mobile platform that has taken the wireless world by storm. An innovative and open platform, Android is well positioned to address the growing needs of the mobile marketplace as it continues to expand beyond early adopters and purchasers of high-end smart…

  • Steganography encryption standard for android application

    0 out of 5
    6,500

    Steganography encryption standard for android application Abstract?Abstract Information (or data) hiding process embeds data into digital media for the purpose of security. Steganography is one such technique in which presence of secret message cannot be detected and we can use it as a tool for security purpose to transmit the confidential information in a secure…

  • Stegnography techniques to mitigate using Smar phone Application

    0 out of 5
    3,500

    Stegnography techniques to mitigate using Smar phone Application Abstract?By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, < Final Year Projects > attacks and hazards to profile…

  • STOLEN MOBILE TRACKING

    0 out of 5
    3,500

    STOLEN MOBILE TRACKING Abstract?STOLEN MOBILE A novel paradigm to detect smartphone physical capture attacks is proposed. Using received signal strength indicator and general system problem solving framework, the paradigm recognizes indoors moving pattern of a phone user. Most existing approaches in detection of physical capture attacks focus on protecting the network not the device. This…

  • Supermarket Control System

    0 out of 5
    5,500

    Supermarket Control System Abstract-This supermarket management system has realized the transmission and control of large goods, so as to facilitate the management and decision of sales, and reduce a big burden for supermarkets and supermarket managers. It also can help to improve the work efficiency of supermarket. The basic idea involved here is that each…

  • Superpixel-Based Hand Gesture Recognition With Kinect Depth Camera

    0 out of 5
    4,500

    Superpixel-Based Hand Gesture Recognition With Kinect Depth Camera Abstract? Superpixel-Based Hand Gesture Recognition With Kinect Depth Camera. A new superpixel-based hand gesture recognition system based on a novel superpixel earth mover?s distance metric, together with Kinect depth camera. The depth and skeleton information from Kinect are effectively utilized to produce markerless hand extractio n. The…

  • Target-Based, Privacy Preserving, and Incremental Association Rule Mining

    0 out of 5
    4,500

    Target-Based, Privacy Preserving, and Incremental Association Rule Mining Abstract-In the first place, consider a special case in association rule mining where mining is conducted by a third party over data located at a central location that is updated from several source locations. The data at the central location is at rest while that flowing in…

  • Technical Data Management Systems On Large Building Construction Projects

    0 out of 5
    3,500

    Technical Data Management Systems On Large Building Construction Projects Abstract? Our proposed solution is to enable partners of a consfruction project to share all the technical data produced and handled, during the building production process by building an information system through the use of internet technology. The system links distributed databases and allows building partners…

  • Tetris Game Application Development

    0 out of 5
    4,500

    Tetris Game Application Development Abstract-Tetris is one of the tile matching puzzle game which is widely used in video games. In Tetris games so many pieces are available which is called Tetromino. The shapes available in tetromino are L, J, I, O, S, T and Z. Tetriminos are game pieces shaped like tetrominoes, geometric shapes…

  • Text Detection and Recognition in Imagery: A Survey

    0 out of 5
    4,500

    Text Detection and Recognition in Imagery: A Survey Abstract? Text Detection and Recognition in Imagery: A Survey. Analyzes, compares, and contrasts technical challenges, methods, and the performance of text detection and recognition research in color imagery. It summarizes the fundamental problems and enumerates factors that should be considered when addressing these problems. Existing < Final…

End of content

End of content