Showing 157–168 of 247 results

  • Multiparty Access Control for Online Social Networks: Model and Mechanisms

    0 out of 5
    4,500

    Multiparty Access Control for Online Social Networks: Model and Mechanisms   Abstract? Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractive means for digital social interactions and information sharing, but also raise a number of security…

  • Multiple Target Localization Using Wideband Echo Chirp Signals

    0 out of 5
    4,500

    Multiple Target Localization Using Wideband Echo Chirp Signals   Abstract?Active target detection and localization is a classical signal processing problem that arises in various military and biomedical applications. A novel method for the detection and estimation of the range, velocity and direction of arrival (DOA) of multiple far-field targets using wideband chirp signals is proposed…

  • New chaotic encryption algorithm based on chaotic sequence and plain text

    0 out of 5
    4,500

    New chaotic encryption algorithm based on chaotic sequence and plain text   Abstract?A new chaotic encryption algorithm is proposed. Its key is based on chaotic sequence and plain text. First, the chaotic sequence and the plain text are used; the result is the key, so even someone obtains the initial value he cannot decrypt the…

  • Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage

    0 out of 5
    4,500

    Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage   Abstract?A novel way to reduce noise introduced or exacerbated by image enhancement methods, in particular algorithms based on the random spray sampling technique, but not only. According to the nature of sprays, output images of spray-based methods tend to exhibit noise with unknown statistical…

  • NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK

    0 out of 5
    4,500

    NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK Abstract? Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection…

  • Object-Level Image Segmentation Using low level cues

    0 out of 5
    4,500

    Object-Level Image Segmentation Using low level cues   Abstract? the problem of automatically segmenting an image into a small number of regions that correspond to objects conveying semantics or high-level structure. Although such object-level segmentation usually requires additional high-level knowledge or learning process, we explore what low level cues can produce for this purpose. Our…

  • Office automation system

    0 out of 5
    3,500

    Office automation system   Abstract? Office automation system Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On Demand * Remote Connectivity *…

  • Placeholder

    Offline signature

    0 out of 5
    4,500

    Offline signature Abstract? Signature verification is widely used for personal verification. But, it has an inevitable problem of getting exploited for forgery therefore an automatic signature recognition and verification system is required. Verification can be accomplished either Online or Offline based application. Offline systems work on the scanned image of a signature. Online systems use…

  • On the Security of End-to-End Measurements Based on Packet-Pair Dispersions

    0 out of 5
    4,500

    On the Security of End-to-End Measurements Based on Packet-Pair Dispersions sequence and plain text   Abstract? The packet-pair technique is a widely adopted method to estimate the capacity of a path. The use of the packet-pair technique has been suggested in numerous applications including network management and end-to-end admission control. Recent observations also indicate that…

  • On-line fast palmprint identification based on adaptive lifting wavelet scheme

    0 out of 5
    4,500

    On-line fast palmprint identification based on adaptive lifting wavelet scheme Abstract? The computation time of classical wavelet transform which based on frequent field is too long to meet the demand of real-time control for roller eccentricity. A novel wavelet based on lifting scheme is proposed for decomposing and dealing with eccentricity signal at the different…

  • On-line surface roughness recognition system using artificial neural networks system in turning operations

    0 out of 5
    4,500

    On-line surface roughness recognition system using artificial neural networks system in turning operations   Abstract? In modern manufacturing environments, the quality assurance of machined parts has attracted great attention from manufacturers. The surface roughness of a workpiece is one of the most important factors to consider. The need for developing a surface recognition system that…

  • oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks

    0 out of 5
    4,500

    < Final Year Project > oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks Abstract?Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users’ passwords are prone to be stolen and compromised under different threats and vulnerabilities. Firstly, users often select…

End of content

End of content