Showing 1957–1968 of 2098 results

  • Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    0 out of 5
    4,500

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Abstract? Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing. Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users IMUs < Final Year Projects 2016 > adjust their malicious behaviors according to their objectives and the network?s defense schemes….

  • Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

    0 out of 5
    4,500

    Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Abstract? Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing. Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users IMUs < Final Year Projects 2016 > adjust their malicious behaviors according to their objectives and the network?s defense schemes….

  • Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison

    0 out of 5
    4,500

    Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison Abstract?Hardware implementation of cryptographic algorithms is subject to various attacks. It has been previously demonstrated that scan chains introduced for hardware testability open a back door to potential attacks. < Final Year Projects > Here, we propose a scan-protection scheme that provides testing facilities both at production…

  • Time Series Shapelets: A New Primitive for Data Mining

    0 out of 5
    4,500

    Time Series Shapelets: A New Primitive for Data Mining Abstract? Time Series Shapelets: A New Primitive for Data Mining. Classification of time series has been attracting great interest over the past decade. Recent empirical evidence has strongly suggested that the simple nearest neighbor algorithm is very difficult to beat for most time series problems. While…

  • Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds

    0 out of 5
    4,500

    Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds Abstract? Running sophisticated software on smart phones could result in poor performance and shortened battery lifetime because of their limited resources. Recently, of?oading computation workload to the cloud has become a promising solution to enhance both performance and battery life of smart phones. However, it…

  • Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles

    0 out of 5
    4,500

    Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles Abstract? Time-Series Classification with COTE: The Collective of Transformation-Based Ensembles. Recently, two ideas have been explored that lead to more accurate algorithms for time-series classi?cation < Final Year Projects 2016 > TSC. First, it has been shown that the simplest way to gain improvement on TSC…

  • Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management

    0 out of 5
    3,500

    Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management Abstract? Timer-based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management. Distributed mobility management DMM is a promising technology to address the mobile data traf?c explosion problem. Since the location information of mobile < Final Year Project 2016 > nodes (MNs)…

  • TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

    0 out of 5
    4,500

    TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Abstract? TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage. Attribute-based Encryption (ABE) is regarded as a promising cryptographic conducting tool to guarantee data owners? direct control over their data in public cloud storage. The earlier…

  • To improve Blood Donation Process using Data Mining Techniques

    0 out of 5
    4,500

    To improve Blood Donation Process using Data Mining Techniques Abstract? To improve Blood Donation Process using Data Mining Techniques. Blood is the vital thing for human being because there is no alternative for replacing it. This makes it necessary for the presence of a system for predicting continuous behavior of healthy blood donors in blood…

  • Placeholder

    To Lie or t o Comply: Defending against FloodAttacks in Disruption Tolerant Networks

    0 out of 5
    4,500

    To Lie or t o Comply: Defending against FloodAttacks in Disruption Tolerant Networks Abstract? To Lie or t o Comply: Defending against FloodAttacks in Disruption Tolerant Networks. For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search…

  • Top-k Similarity Join in Heterogeneous Information Networks

    0 out of 5
    4,500

    Top-k Similarity Join in Heterogeneous Information Networks Abstract? Top-k Similarity Join in Heterogeneous Information Networks. As a newly emerging network model, heterogeneous information networks < Final Year Projects 2016 > have received growing attention. Many data mining tasks have been explored in HINs, including clustering, classi?cation, and similarity search. Similarity join is a fundamental operation…

  • Placeholder

    Topic Mining over Asynchronous Text Sequences

    0 out of 5
    4,500

    Topic Mining over Asynchronous Text Sequences Abstract? Topic Mining over Asynchronous Text Sequences. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On…

End of content

End of content