Steganography Using Reversible Texture Synthesis Abstract?Steganography Using Reversible Texture Synthesis. A novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image,which synthesizes a new texture image with a similar local appearance and an arbitrary size. We weave the texture synthesis process into steganography to conceal secret messages….
Stegnography techniques to mitigate using Smar phone Application Abstract?By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, < Final Year Projects > attacks and hazards to profile…
STOLEN MOBILE TRACKING Abstract?STOLEN MOBILE A novel paradigm to detect smartphone physical capture attacks is proposed. Using received signal strength indicator and general system problem solving framework, the paradigm recognizes indoors moving pattern of a phone user. Most existing approaches in detection of physical capture attacks focus on protecting the network not the device. This…
Student data mining solution?knowledge management system related to higher education institutions Abstract?Higher education institutions (HEIs) are often curious whether students will be successful or not during their study. Before or during their courses the academic institutions try to estimate the percentage of successful students. But is it possible to predict the success rate of students…
Student Performance Analysis Abstract?Student Performance Analysis. A good Automating Student Performance Analysis system will automate user?s activities, processes and practices, as well as increase their ability to handle a greater capacity of events. This is an efficient Automating Student Performance Analysis system software project that serves the functionality of an event manager. The event manager…
Subcarrier and Power Allocation for OFDMA-Based Cognitive Radio Systems With Joint Overlay and Underlay Spectrum Access Mechanism Abstract?Subcarrier and Power Allocation for OFDMA-Based Cognitive Radio Systems With Joint Overlay and Underlay Spectrum Access Mechanism.In this paper, we study a subcarrier-and-power-allocation problem for orthogonal-frequency-division multiple-access (OFDMA)-based cognitive radio (CR) systems. In a departure from existing works…
Successive Interference Mitigation in Multiuser MIMO Channels Abstract? Successive Interference Mitigation in Multiuser MIMO Channels. Motivated by the work of Dahrouj and Yu in applying the Han-Kobayashi transmission strategy for mitigating the intercell interference in a multi-cell multi-user multiple-input single-output Interference network MISO IN, < Final Year Projects 2016 > this paper considers splitting messages…
Sum capacity maximization for MIMO?OFDMA based cognitive radio networks Abstract? Sum capacity maximization for MIMO?OFDMA based cognitive radio networks. In the opportunistic Cognitive Radio (CR) networks, the secondary users? (SU) capacity is limited due to the need to avoid the primary users? (PUs) bands. The combination of the Multiple-Input Multiple-Output (MIMO) structure with the orthogonal…
Superpixel-Based Hand Gesture Recognition With Kinect Depth Camera Abstract? Superpixel-Based Hand Gesture Recognition With Kinect Depth Camera. A new superpixel-based hand gesture recognition system based on a novel superpixel earth mover?s distance metric, together with Kinect depth camera. The depth and skeleton information from Kinect are effectively utilized to produce markerless hand extractio n. The…
Supervised Variational Model With Statistical Inference and Its Application in Medical Image Segmentation Abstract? Automated and general medical image segmentation can be challenging because the foreground and the background may have complicated and overlapping density distributions in medical imaging. Conventional region-based level set algorithms often assume piecewise constant or piecewise smooth for segments, which are…
Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment Abstract? Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment. Digital certificates and signatures provide protection in legally binding situations. Even though the digital certificates are used in banking and…
SWICOM: An SDR-Based Wireless Communication Gateway for Vehicles Abstract? SWICOM: An SDR-Based Wireless Communication Gateway for Vehicles. A wide range of emerging and promising wireless communication protocols are rapidly being introduced into vehicles. They are commonly used for in-car infotainment, telematics, and safety applications. However, adopting new wireless communications into vehicles requires them to be…