Showing 1753–1764 of 1967 results

  • STARS: A Statistical Traffic Pattern Discovery System for MANETs

    0 out of 5
    4,500

    STARS: A Statistical Traffic Pattern Discovery System for MANETs Abstract?STARS: A Statistical Traffic Pattern Discovery System for MANETs. Many anonymity enhancing techniques have been proposed based on packet encryption to protect the communication anonymity of mobile ad hoc networks (MANETs). However, in this paper, we show that MANETs are still vulnerable under passive statistical traffic…

  • Placeholder

    Static Handwritten Signature Recognition using Discrete Random Transform and Combined Projection based Technique

    0 out of 5
    4,500

    Static Handwritten Signature Recognition using Discrete Random Transform and Combined Projection based Technique Abstract? Static Handwritten Signature Recognition using Discrete Random Transform and Combined Projection based Technique. In this paper, we proposed Discrete Radon Transform (DRT) technique for feature extraction of static signature recognition to identify forgeries. Median filter has been introduced for noise cancellation…

  • Statistical Characterizations and Environment Modelling of Impacts of Water Quality.

    0 out of 5
    4,500

    Statistical Characterizations and Environment Modelling of Impacts of Water Quality. Abstract?Water Maintains link between the five biomes and its make up the part of the biosphere. The Aquatic biome is mainly classified into fresh and marine water. The Aquatic biomes are largely classified into fresh water and marine. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=”…

  • Placeholder

    Steganography Using Reversible Texture Synthesis

    0 out of 5
    4,500

    Steganography Using Reversible Texture Synthesis Abstract? Steganography Using Reversible Texture Synthesis. We propose a novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image, which synthesizes a new texture image with a similar local appearance and an arbitrary size. We weave the texture synthesis process into steganography…

  • Steganography Using Reversible Texture Synthesis

    0 out of 5
    4,500

    Steganography Using Reversible Texture Synthesis Abstract?Steganography Using Reversible Texture Synthesis. A novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image,which synthesizes a new texture image with a similar local appearance and an arbitrary size. We weave the texture synthesis process into steganography to conceal secret messages….

  • Stegnography techniques to mitigate using Smar phone Application

    0 out of 5
    3,500

    Stegnography techniques to mitigate using Smar phone Application Abstract?By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, < Final Year Projects > attacks and hazards to profile…

  • STOLEN MOBILE TRACKING

    0 out of 5
    3,500

    STOLEN MOBILE TRACKING Abstract?STOLEN MOBILE A novel paradigm to detect smartphone physical capture attacks is proposed. Using received signal strength indicator and general system problem solving framework, the paradigm recognizes indoors moving pattern of a phone user. Most existing approaches in detection of physical capture attacks focus on protecting the network not the device. This…

  • Placeholder

    Structured Sparse Error Coding for Face Recognition With Occlusion

    0 out of 5
    4,500

    Structured Sparse Error Coding for Face Recognition With Occlusion Abstract?Face recognition with occlusion is common in the real world. Inspired by the works of structured sparse representation, we try to explore the structure of the error incurred by occlusion from two aspects: the error morphology and the error distribution. Since human beings recognize the occlusion…

  • Student data mining solution?knowledge management system related to higher education institutions

    0 out of 5
    3,500

    Student data mining solution?knowledge management system related to higher education institutions Abstract?Higher education institutions (HEIs) are often curious whether students will be successful or not during their study. Before or during their courses the academic institutions try to estimate the percentage of successful students. But is it possible to predict the success rate of students…

  • Student Performance Analysis

    0 out of 5
    4,500

    Student Performance Analysis Abstract?Student Performance Analysis. A good Automating Student Performance Analysis system will automate user?s activities, processes and practices, as well as increase their ability to handle a greater capacity of events. This is an efficient Automating Student Performance Analysis system software project that serves the functionality of an event manager. The event manager…

  • Placeholder

    Student Portal Management System

    0 out of 5
    3,500

    Student Portal Management System Abstract? Student Portal Management System. The paper describes the Knowledge Management System (KMS) about military universities (MilUNI), mostly in the NATO environment, but it also includes all European countries. The goal of the MilUNI is to support the cooperation among universities in education, research, and the staff and students exchange. The…

  • Placeholder

    Study Of Bank By various type of bank services

    0 out of 5
    3,500

    Study Of Bank By various type of bank services Abstract? Study Of Bank By various type of bank services. The presence of microcalcification clusters in mammograms contributes evidence for the diagnosis of early stages of breast cancer. Computer aided diagnosis (CAD) can be used as a useful tool for improving the accuracy of the diagnosis…

End of content

End of content