Showing 73–84 of 320 results

  • Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study

    0 out of 5
    4,500

    Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study Abstract? Applications of cyber technologies improve the quality of monitoring and decision making in smart grid. These cyber technologies are vulnerable to malicious attacks, and compromising them can have serious technical and economical problems.< Final Year Project > This paper specifies the…

  • BIOLOGICAL EARLY BRAIN CANCER DETECTION USING ARTIFICIAL NEURAL NETWORK

    0 out of 5
    4,500

    BIOLOGICAL EARLY BRAIN CANCER DETECTION USING ARTIFICIAL NEURAL NETWORK   Computer aided diagnosis systems for detecting malignanttexture in biological study have been investigated usingseveral techniques. This paper presents an approach incomputer-aided diagnosis for early prediction of braincancer using Texture features and neuro classification logic.< Final Year Projects >The Tumor mass detection and Cluster microclassification is…

  • Biomedical Document Clustering Using Ontology based Concept Weight

    0 out of 5
    4,500

    Biomedical Document Clustering Using Ontology based Concept Weight   Abstract?Conventional document clustering techniques are mainly based on the existence of keywords and the number of occurrences of it. Most of the term frequency based clustering techniques consider the documents as bag-of-words and ignore the important relationships between the words in the document. Phrase based clustering…

  • BLOOD BANKING SYSTEM WITH GPS USING ANDROID

    0 out of 5
    3,500

    BLOOD BANKING SYSTEM WITH GPS USING ANDROID Abstract? BLOOD BANKING SYSTEM WITH GPS USING ANDROID Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference…

  • Building a Scalable Database-Driven Reverse Dictionary

    0 out of 5
    4,500

    Building a Scalable Database-Driven Reverse Dictionary   Abstract? Building a Scalable Database-Driven Reverse Dictionary. we describe the design and implementation of a reverse dictionary. Unlike a traditional forward dictionary, which maps from words to their definitions, a reverse dictionary takes a user input phrase describing the desired concept, and returns a set of candidate words…

  • CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

    0 out of 5
    4,500

    CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Abstract? Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. < Final Year Project > Unfortunately, it also…

  • Cardiac arrhythmias detection in an ECG beat signal using fast fourier transform and artificial neural network

    0 out of 5
    4,500

    Cardiac arrhythmias detection in an ECG beat signal using fast fourier transform and artificial neural network   Abstract?Cardiac Arrhythmias shows a condition of abnor-mal electrical activity in the heart which is a threat to humans. This paper presents a method to analyze electrocardiogram (ECG) signal, extract the fea-tures, for the classification of heart beats according…

  • cashing in on cloud cache Service

    0 out of 5
    4,500

    cashing in on cloud cache Service Abstract? Over the past decades, caching has become the key technology used for bridging the performance gap across memory hierarchies via temporal or spatial localities; in particular, the effect is prominent in disk storage systems. Applications that involve heavy I/O activities, which are common in the cloud, probably benefit…

  • CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks

    0 out of 5
    4,500

    CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks   Abstract? wireless sensor networks, data aggregation scheme that reduces a large amount of transmission is the most practical technique. In previous studies, homomorphic encryptions have been applied to conceal communication during aggregation such that enciphered data can be aggregated algebraically without decryption….

  • CIDS-A framework for intrusion detection in cloud system

    0 out of 5
    4,500

    CIDS-A framework for intrusion detection in cloud system   Abstract? By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for “CIDS” a cloud based intrusion detection system, to solve the deficiencies of current IDSs.< Final Year Projects > CIDS also provides a component to summarize…

  • Circular Reranking for Visual Search.

    0 out of 5
    4,500

    Circular Reranking for Visual Search.We propose a hybrid scheduling algorithm for load balancing in a distributed environment by combining the methodology of Divide-and-Conquer and Throttled algorithms referred to as DCBT. Our algorithm plays an important role in distributing the incoming load in an efficient manner so that it maximizes resource utilization in a cloud environment….

  • Classification of EEG signal using wavelet pocket, GA, RBF

    0 out of 5
    4,500

    Classification of EEG signal using wavelet pocket, GA, RBF   Abstract?we propose new features based on multiwavelet transform for classification of human emotions from electroencephalogram (EEG) signals. The EEG signal measures electrical activity of the brain, which contains lot of information related to emotional states.< Final Year Project > The sub-signals obtained by multiwavelet decomposition…

End of content

End of content