Showing 1321–1332 of 1348 results

  • Using Dependency Structures for Prioritization of Functional Test Suites

    0 out of 5
    4,500

    Using Dependency Structures for Prioritization of Functional Test Suites   Abstract?Test case prioritization is the process of ordering the execution of test cases to achieve a certain goal, such as increasing the rate of fault detection. Increasing the rate of fault detection can provide earlier feedback to system developers, improving fault fixing activity and, ultimately,…

  • Using Facebook for Image Steganography

    0 out of 5
    4,500

    Using Facebook for Image Steganography Abstract? Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held devices running iOS, Android, or Windows Phone), it would…

  • Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for credit card fraud detection

    0 out of 5
    4,500

    Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for credit card fraud detection Abstract-With the growing usage of credit card transactions, financial fraud crimes have also been drastically increased leading to the loss of huge amounts in the finance industry. Having an efficient fraud detection method has become a necessity for all banks in…

  • Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds

    0 out of 5
    4,500

    Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds Abstract?Recent research has provided evidence indicating how a malicious user could perform coresidence profiling and public-to-private IP mapping to target and exploit customers which share physical resources. The attacks rely on two steps: resource placement on the target?s physical machine and…

  • Using Sentimental Analysis in Prediction of Stock Market Investment

    0 out of 5
    5,500

    Using Sentimental Analysis in Prediction of Stock Market Investment Abstract?AbstractSentimental Analysis is one of the most popular technique which is widely been used in every industry. Extraction of sentiments from user?s comments is used in detecting the user view for a particular company. Sentimental Analysis can help in predicting the mood of people which affects…

  • Vampire attacks: Draining life from wireless ad-hoc sensor networks

    0 out of 5
    4,500

    Vampire attacks: Draining life from wireless ad-hoc sensor networks Images Abstract? Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. < Final Year Project > Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores…

  • VChunkJoin: An Efficient Algorithm for Edit Similaerity Join

    0 out of 5
    4,500

    VChunkJoin: An Efficient Algorithm for Edit Similaerity Join Abstract? VChunkJoin: An Efficient Algorithm for Edit Similaerity Join. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ]…

  • Ver ifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

    0 out of 5
    4,500

    Verifiable and Exculpable Outsourced Attribute-Based Encr yption for Access Control in Cloud Computing Abstract-In the first place, propose two ciphertext-policy attribute-based key encapsulation mechanism (CP-AB-KEM) schemes that for the first time achieve both outsourced encryption and outsourced decryption in two system storage models and give corresponding security analysis. In our schemes, heavy computations are outsourced…

  • Verifiable Auditing for Outsourced Database in Cloud Computing

    0 out of 5
    4,500

    Verifiable Auditing for Outsourced Database in Cloud Computing Abstract? Verifiable Auditing for Outsourced Database in Cloud Computing. The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider < Final Year Projects 2016 > CSP that provides various database services to different users. Recently, plenty of research…

  • Versatile Size-l Object Summaries for Relational Keyword Search

    0 out of 5
    4,500

    Versatile Size-l Object Summaries for Relational Keyword Search Abstract? Versatile Size-l Object Summaries for Relational Keyword Search. The Object Summary (OS)is a recently proposed tree structure, which summarizes all data held in a relational database about a data subject. An OS can potentially be < Final Year Projects > very large in size and therefore…

  • ViDE: A Vision-Based Approach for Deep Web Data Extraction

    0 out of 5
    4,500

    ViDE: A Vision-Based Approach for Deep Web Data Extraction   Abstract? Deep Web contents are accessed by queries submitted to Web databases and the returned data records are enwrapped in dynamically generated Web pages (they will be called deep Web pages in this paper). Extracting structured data from deep Web pages is a challenging problem…

  • Virtual machine power measuring technique with bounded error in cloud environments

    0 out of 5
    4,500

    Virtual machine power measuring technique with bounded error in cloud environments   Abstract? Virtual machine power measuring technique with bounded error in cloud environments. Several fields of science have traditionally demanded large-scale workflow support, which requires thousands of CPU cores or more. In this paper, we investigate ways to support these scientific workflows in a…

End of content

End of content