Showing 457–468 of 1911 results

  • Chatting Application Using Google Cloud Messaging

    0 out of 5
    3,500

    Chatting Application Using Google Cloud Messaging Abstract? Chatting Application Using Google Cloud Messaging. Google Cloud Messaging < Final Year Projects 2016 > GCM is a free service that enables users to send messages between servers and client apps. This includes downstream messages from servers to client apps, and upstream messages from client apps to servers….

  • Placeholder

    CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution

    0 out of 5
    4,500

    CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution Abstract?CipherXRay: Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic algorithms (e.g., packing, encrypting C&C communication) to protect themselves from being analyzed. The use of cryptographic algorithms and truly transient cryptographic secrets inside the malware binary imposes a key obstacle to…

  • Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing

    0 out of 5
    4,500

    Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing Abstract? In the cloud, for achieving access control and keeping data confidential, the data owners could adopt attribute-based encryption to encrypt the stored data. Users with limited computing power are however more likely to delegate the mask of the decryption task to the cloud…

  • CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications

    0 out of 5
    4,500

    CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications Abstract? CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications. We propose a forensic analysis system called crime investigation system using the relative importance < Final Year Projects 2016 >…

  • Citizen card system

    0 out of 5
    4,500

    Citizen card system Abstract?Citizen card system. Citizen card system, commonly based on SOA (Service-Oriented Architecture) has brought great comfort and convenience to the locals, drumming up the progress of Urban Information Construction. However, the application of citizen card system has not been popularized for some technical reason. This paper briefly introduces its current situation, and…

  • Civil Registration

    0 out of 5
    3,500

    Civil Registration Abstract?The trends models identity management available, authentication, authorization and audit have been analyzed in order to mitigate the vulnerabilities and risks of the information. The development of this model for the Civil Registry of Ecuador in the next phase was determined. The deductive method was used in the analysis. Resulted methodologies should be…

  • Placeholder

    Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams

    0 out of 5
    4,500

    Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams Abstract? Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams. Data stream classification poses many challenges to the data mining community. In this paper, we address four such major challenges, namely, infinite length, concept-drift, concept-evolution, and feature-evolution. Since a data stream is theoretically infinite…

  • Placeholder

    Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams

    0 out of 5
    4,500

    Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams Abstract?Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams. Data stream classification poses many challenges to the data mining community. In this paper, we address four such major challenges, namely, infinite length, concept-drift, concept-evolution, and feature-evolution. Since a data stream is theoretically infinite in…

  • Placeholder

    Classification And Novel Class Detection In Concept-Drifting Data Streams Under Time Constraints

    0 out of 5
    4,500

    Classification And Novel Class Detection In Concept-Drifting Data Streams Under Time Constraints Abstract? Classification And Novel Class Detection In Concept-Drifting Data Streams Under Time Constraints. Data stream is continuous < Final Year Projects > and always change in nature. Data stream mining is the process of extracting knowledge form continuous data. Due to its dynamic…

  • Placeholder

    Classification of Color Images of Dermatological Ulcers

    0 out of 5
    4,500

    Classification of Color Images of Dermatological Ulcers Abstract?We present color image processing methods for the analysis of images of dermatological lesions. The focus of this study is on the application of feature extraction and selection methods for classification and analysis of the tissue composition of skin lesions or ulcers, in terms of granulation (red), fibrin…

  • Placeholder

    Classification of EEG signal using wavelet pocket, GA, RBF

    0 out of 5
    4,500

    Classification of EEG signal using wavelet pocket, GA, RBF Abstract?we propose new features based on multiwavelet transform for classification of human emotions from electroencephalogram (EEG) signals. The EEG signal measures electrical activity of the brain, which contains lot of information related to emotional states.< Final Year Project > The sub-signals obtained by multiwavelet decomposition of…

  • Placeholder

    Classification of Simultaneous Movements Using Surface EMG Pattern Recognition

    0 out of 5
    4,500

    Classification of Simultaneous Movements Using Surface EMG Pattern Recognition Abstract?Advanced upper limb prostheses capable of actuating multiple degrees of freedom (DOFs) are now commercially available. Pattern recognition algorithms that use surface electromyography (EMG) signals show great promise as multi-DOF controllers. Unfortunately, current pattern recognition systems are limited to activate only one DOF at a time….

End of content

End of content