Showing 1105–1116 of 1331 results

  • Scalable Daily Human Behavioral Pattern Mining from Multivariate Temporal Data

    Scalable Daily Human Behavioral Pattern Mining from Multivariate Temporal Data

    0 out of 5
    5,500

    Scalable Daily Human Behavioral Pattern Mining from Multivariate Temporal Data Abstract? This work introduces a set of scalable algorithms to identify patterns of human daily behaviors. These patterns are extracted from multivariate temporal data that have been collected from smartphones. We have exploited sensors that are available on these devices, and have identified frequent behavioral…

  • Scene Text Detection and Segmentation Based on Cascaded Convolution Neural Networks

    Scene Text Detection and Segmentation Based on Cascaded Convolution Neural Networks

    0 out of 5
    4,500

    Scene Text Detection and Segmentation Based on Cascaded Convolution Neural Networks Abstract-Scene text detection and segmentation are two important and challenging research problems in the field of computer vision. This paper proposes a novel method for scene text detection and segmentation based on cascaded convolution neural networks (CNNs). In this method, a CNN-based textaware candidate…

  • Scheduling Application In Android

    Scheduling Application In Android

    0 out of 5
    5,500

    Scheduling Application In Android Abstract-Android is open source based Linux kernel operating system mostly designed for touchscreen for mobile devices such as mobile phones and tablet computers. There are bunch of schedule android applications available today on play store providing static notification to user before a specified interval of time. The static notifications will not…

  • SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc Networks

    SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc Networks

    0 out of 5
    5,500

    SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc Networks Abstract?The issue of selecting routing paths with minimum end-to-end delay (E2ED) for nonsafety applications in urban vehicular adhoc networks (VANETs). Most existing schemes aim at reducing E2ED via greedy-based tech-niques < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code…

  • Search Engine

    Search Engine

    0 out of 5
    6,500

    S3K: Search Engine Abstract?Abstract This project is aimed at developing a repository for Get information about Madurai surrounding. The Repository and Search Engine (RASE) is an Internet based application that can be accessed throughout the World.Anyone can access the search Engine to know about Madurai but can’t able to add.We can easily to find all…

  • Search Rank Fraud and Malware Detection in Google Play

    Search Rank Fraud and Malware Detection in Google Play

    0 out of 5
    5,500

    Search Rank Fraud and Malware Detection in Google Play Abstract-In the first place, fraudulent behaviors in Google Play, the most popular Android app market, fuel search rank abuse and malware proliferation. To identify malware, previous work has focused on app executable and permission analysis. In addition, a novel system that discovers and leverages traces left…

  • Searchable Encryption over Feature-Rich Data

    Searchable Encryption over Feature-Rich Data

    0 out of 5
    5,500

    Searchable Encryption over Feature-Rich Data Abstract?Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File…

  • SecRBAC: Secure data in the Clouds

    SecRBAC: Secure data in the Clouds

    0 out of 5
    5,500

    SecRBAC: Secure data in the Clouds Abstract? Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loos of control over their data and raises reasonable security concerns that slow down the…

  • Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks

    Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks

    0 out of 5
    5,500

    Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks Abstract? the secrecy outage performance of transmit antenna selection (TAS)/maximal ratio combining (MRC) in multiple-input?multiple-output (MIMO) cognitive radio networks (CRNs) over Rayleigh fading channels. In the considered system, a secondary user (SU-TX) equipped with NA (NA ? 1) antennas uses TAS to…

  • Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage

    Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage

    0 out of 5
    4,500

    Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage Abstract-Cloud storage facilitates both individuals and enterprises to cost effectively share their data over the Internet.However,this also brings difficult challenges to the access control of shared data since few cloud servers can be fully trusted. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach that enables…

  • Secure and Efficient Protocol for Route Optimization in PMIPv6-based Smart Home IoT Networks

    Secure and Efficient Protocol for Route Optimization in PMIPv6-based Smart Home IoT Networks

    0 out of 5
    4,500

    Game Theory Based Correlated Pr ivacy Preser ving Analysis in Big Data Abstract-The communication in the Smart Home Internet of Things (SH-IoT) comprising various electronic devices and sensors is very sensitive and crucial. In addition, the key requirements of SH-IoT include channel security, handover support, mobility management, and consistent data rates. Proxy Mobile IPv6 (PMIPv6)…

  • Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure

    Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure

    0 out of 5
    4,500

    Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure Abstract-In the first place, with the fast growing demands for the big data, we need to manage and store the big data in the cloud. Since the cloud is not fully trusted and it can be accessed by any users, the data in the…

End of content

End of content