Showing 1861–1872 of 1910 results

  • Placeholder

    Use of elliptic curve cryptography for multimedia encryption

    0 out of 5
    4,500

    Use of elliptic curve cryptography for multimedia encryption Abstract?Use of elliptic curve cryptography for multimedia encryption. The unique characteristics of the elliptic curve cryptography (ECC) such as the small key size, fast computations and bandwidth saving make its use attractive for multimedia encryption. In this study, the ECC is used to perform encryption along with…

  • User-Defined Privacy Grid System for Continuous Location-Based Services

    0 out of 5
    4,500

    User-Defined Privacy Grid System for Continuous Location-Based Services Abstract? User-Defined Privacy Grid System for Continuous Location-Based Services. Location-based services < Final Year Projects 2016 > require users to continuously report their location to a potentially untrusted serverto obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques for…

  • Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment

    0 out of 5
    4,500

    Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment Abstract? Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment. Infrastructure as a Service < Final Year Projects 2016 > IaaS clouds provide virtual machines(VMs) under a pay-per-use business model, which can be used to create a dynamically…

  • Using Crowdsourcing to Provide QoS for Mobile Cloud Computing

    0 out of 5
    4,500

    Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Abstract?Using Crowdsourcing to Provide QoS for Mobile Cloud Computing.Quality of cloud service QoS < Final Year Projects 2016 > is one of the crucial factors for the success of cloud providers in mobile cloud computing. Context-awareness is a popular method for automatic awareness of the mobile…

  • Using Data Mining Techniques for Detecting Terror-Related Activities on the Web

    0 out of 5
    4,500

    Using Data Mining Techniques for Detecting Terror-Related Activities on the Web Abstract? Using Data Mining Techniques for Detecting Terror-Related Activities on the Web. An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior (?profile?) of terrorists by applying a data…

  • Placeholder

    Using Dependency Structures for Prioritization of Functional Test Suites

    0 out of 5
    4,500

    Using Dependency Structures for Prioritization of Functional Test Suites Abstract?Test case prioritization is the process of ordering the execution of test cases to achieve a certain goal, such as increasing the rate of fault detection. Increasing the rate of fault detection can provide earlier feedback to system developers, improving fault fixing activity and, ultimately, software…

  • Placeholder

    Using Facebook for Image Steganography

    0 out of 5
    4,500

    Using Facebook for Image Steganography Abstract? Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held devices running iOS, Android, or Windows Phone), it would…

  • Placeholder

    Using PSO in a spatial domain based image hiding scheme

    0 out of 5
    4,500

    Using PSO in a spatial domain based image hiding scheme Abstract?Using PSO in a spatial domain based image hiding scheme. In this paper, we propose a new scheme of data hiding of encrypted images for the purpose of verifying the reliability of an image into both encrypted and spatial domains. This scheme couples the Quantization…

  • Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing

    0 out of 5
    4,500

    Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing Abstract? Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing. Cloud computing enables users to consume various < Final Year Projects 2016 > IT resources in an on-demand manner, and with low management overhead. However, customers can face…

  • Vampire attacks: Draining life from wireless ad-hoc sensor networks

    0 out of 5
    4,500

    Vampire attacks: Draining life from wireless ad-hoc sensor networks Images Abstract? Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. < Final Year Project > Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores…

  • Placeholder

    VANET-Based Secure and Privacy-Preserving Navigation

    0 out of 5
    4,500

    VANET-Based Secure and Privacy-Preserving Navigation Abstract? VANET-Based Secure and Privacy-Preserving Navigation. In this paper, we propose a navigation scheme that utilizes the online road information collected by a vehicular ad hoc network (VANET) to guide the drivers to desired destinations in a real-time and distributed manner. The proposed scheme has the advantage of using real-time…

  • VEGAS: Visual influEnce GrAph Summarization on Citation Networks

    0 out of 5
    4,500

    VEGAS: Visual influEnce GrAph Summarization on Citation Networks Abstract? VEGAS: Visual influEnce GrAph Summarization on Citation Networks. Visually analyzing citation networks poses challenges to many fields of the data mining research. How can we summarize a large citation graph according to the user?s interest? In particular, how can we illustrate the impact of a highly…

End of content

End of content