Using Dependency Structures for Prioritization of Functional Test Suites Abstract?Test case prioritization is the process of ordering the execution of test cases to achieve a certain goal, such as increasing the rate of fault detection. Increasing the rate of fault detection can provide earlier feedback to system developers, improving fault fixing activity and, ultimately,…
Using Facebook for Image Steganography Abstract? Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held devices running iOS, Android, or Windows Phone), it would…
Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for credit card fraud detection Abstract-With the growing usage of credit card transactions, financial fraud crimes have also been drastically increased leading to the loss of huge amounts in the finance industry. Having an efficient fraud detection method has become a necessity for all banks in…
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds Abstract?Recent research has provided evidence indicating how a malicious user could perform coresidence profiling and public-to-private IP mapping to target and exploit customers which share physical resources. The attacks rely on two steps: resource placement on the target?s physical machine and…
Using Sentimental Analysis in Prediction of Stock Market Investment Abstract?AbstractSentimental Analysis is one of the most popular technique which is widely been used in every industry. Extraction of sentiments from user?s comments is used in detecting the user view for a particular company. Sentimental Analysis can help in predicting the mood of people which affects…
Vampire attacks: Draining life from wireless ad-hoc sensor networks Images Abstract? Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. < Final Year Project > Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores…
Verifiable and Exculpable Outsourced Attribute-Based Encr yption for Access Control in Cloud Computing Abstract-In the first place, propose two ciphertext-policy attribute-based key encapsulation mechanism (CP-AB-KEM) schemes that for the first time achieve both outsourced encryption and outsourced decryption in two system storage models and give corresponding security analysis. In our schemes, heavy computations are outsourced…
Verifiable Auditing for Outsourced Database in Cloud Computing Abstract? Verifiable Auditing for Outsourced Database in Cloud Computing. The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider < Final Year Projects 2016 > CSP that provides various database services to different users. Recently, plenty of research…
Versatile Size-l Object Summaries for Relational Keyword Search Abstract? Versatile Size-l Object Summaries for Relational Keyword Search. The Object Summary (OS)is a recently proposed tree structure, which summarizes all data held in a relational database about a data subject. An OS can potentially be < Final Year Projects > very large in size and therefore…
ViDE: A Vision-Based Approach for Deep Web Data Extraction Abstract? Deep Web contents are accessed by queries submitted to Web databases and the returned data records are enwrapped in dynamically generated Web pages (they will be called deep Web pages in this paper). Extracting structured data from deep Web pages is a challenging problem…
Virtual machine power measuring technique with bounded error in cloud environments Abstract? Virtual machine power measuring technique with bounded error in cloud environments. Several fields of science have traditionally demanded large-scale workflow support, which requires thousands of CPU cores or more. In this paper, we investigate ways to support these scientific workflows in a…