Showing 3589–3600 of 3682 results

  • User-Defined Privacy Grid System for Continuous Location-Based Services

    User-Defined Privacy Grid System for Continuous Location-Based Services

    0 out of 5
    4,500

    User-Defined Privacy Grid System for Continuous Location-Based Services Abstract? User-Defined Privacy Grid System for Continuous Location-Based Services. Location-based services < Final Year Projects 2016 > require users to continuously report their location to a potentially untrusted server to obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques…

  • User-Service Rating Prediction by Exploring Social Users? Rating Behaviors

    User-Service Rating Prediction by Exploring Social Users? Rating Behaviors

    0 out of 5
    5,500

    User-Service Rating Prediction by Exploring Social Users? Rating Behaviors Abstract? the boom of social media, it is a very popular trend for people to share what they are doing with friends across various social networking platforms. Nowadays, we have a vast amount of descriptions, comments, and ratings for local services. The information is valuable for…

  • Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization

    Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization

    0 out of 5
    5,500

    Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization Abstract?Online social networks have gained significant popularity recently. The Location-Based Social Networks (LBSNs) are a special kind of online social networks in which people can share location-embedded information. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation…

  • Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization

    Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization

    0 out of 5
    5,500

    Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization Abstract? Online social networks have gained significant popularity recently. The problem of influence maximization in online social networks has been extensively studied. However, in prior works, influence propagation in the physical world, which is also an indispensable factor, is not considered. The Location-Based Social…

  • Using Crowdsourcing to Provide QoS for Mobile Cloud Computing

    Using Crowdsourcing to Provide QoS for Mobile Cloud Computing

    0 out of 5
    4,500

    Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Abstract?Using Crowdsourcing to Provide QoS for Mobile Cloud Computing.Quality of cloud service QoS < Final Year Projects 2016 > is one of the crucial factors for the success of cloud providers in mobile cloud computing. Context-awareness is a popular method for automatic awareness of the mobile…

  • Using Crowdsourcing to Provide QoS for Mobile Cloud Computing

    Using Crowdsourcing to Provide QoS for Mobile Cloud Computing

    0 out of 5
    5,500

    Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Abstract? Quality of cloud service (QoS) is one of the crucial factors for the success of cloud providers in mobile cloud computing. Context-awareness is a popular method for automatic awareness of the mobile environment and choosing the most suitable cloud provider. Lack of context information may…

  • Using Dependency Structures for Prioritization of Functional Test Suites

    Using Dependency Structures for Prioritization of Functional Test Suites

    0 out of 5
    4,500

    Using Dependency Structures for Prioritization of Functional Test Suites   Abstract?Test case prioritization is the process of ordering the execution of test cases to achieve a certain goal, such as increasing the rate of fault detection. Increasing the rate of fault detection can provide earlier feedback to system developers, improving fault fixing activity and, ultimately,…

  • Using Facebook for Image Steganography

    Using Facebook for Image Steganography

    0 out of 5
    4,500

    Using Facebook for Image Steganography Abstract? Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held devices running iOS, Android, or Windows Phone), it would…

  • Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for credit card fraud detection

    Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for credit card fraud detection

    0 out of 5
    4,500

    Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for credit card fraud detection Abstract-With the growing usage of credit card transactions, financial fraud crimes have also been drastically increased leading to the loss of huge amounts in the finance industry. Having an efficient fraud detection method has become a necessity for all banks in…

  • Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds

    Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds

    0 out of 5
    4,500

    Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds Abstract?Recent research has provided evidence indicating how a malicious user could perform coresidence profiling and public-to-private IP mapping to target and exploit customers which share physical resources. The attacks rely on two steps: resource placement on the target?s physical machine and…

  • Using PSO in a spatial domain based image hiding scheme

    Using PSO in a spatial domain based image hiding scheme

    0 out of 5
    4,500

    Using PSO in a spatial domain based image hiding scheme Abstract?Using PSO in a spatial domain based image hiding scheme. In this paper, we propose a new scheme of data hiding of encrypted images for the purpose of verifying the reliability of an image into both encrypted and spatial domains. This scheme couples the Quantization…

  • Using Sentimental Analysis in Prediction of Stock Market Investment

    Using Sentimental Analysis in Prediction of Stock Market Investment

    0 out of 5
    5,500

    Using Sentimental Analysis in Prediction of Stock Market Investment Abstract?AbstractSentimental Analysis is one of the most popular technique which is widely been used in every industry. Extraction of sentiments from user?s comments is used in detecting the user view for a particular company. Sentimental Analysis can help in predicting the mood of people which affects…

End of content

End of content