Showing 961–972 of 1076 results

  • Steganography Using Reversible Texture Synthesis

    Steganography Using Reversible Texture Synthesis

    0 out of 5
    4,500

    Steganography Using Reversible Texture Synthesis Abstract?Steganography Using Reversible Texture Synthesis. A novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image,which synthesizes a new texture image with a similar local appearance and an arbitrary size. We weave the texture synthesis process into steganography to conceal secret messages….

  • Stegnography techniques to mitigate using Smar phone Application

    Stegnography techniques to mitigate using Smar phone Application

    0 out of 5
    3,500

    Stegnography techniques to mitigate using Smar phone Application Abstract?By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, < Final Year Projects > attacks and hazards to profile…

  • STOLEN MOBILE TRACKING

    STOLEN MOBILE TRACKING

    0 out of 5
    3,500

    STOLEN MOBILE TRACKING Abstract?STOLEN MOBILE A novel paradigm to detect smartphone physical capture attacks is proposed. Using received signal strength indicator and general system problem solving framework, the paradigm recognizes indoors moving pattern of a phone user. Most existing approaches in detection of physical capture attacks focus on protecting the network not the device. This…

  • Java-Data Miningmanagement system related to higher education institutions

    Student data mining solution?knowledge management system related to higher education institutions

    0 out of 5
    3,500

    Student data mining solution?knowledge management system related to higher education institutions Abstract?Higher education institutions (HEIs) are often curious whether students will be successful or not during their study. Before or during their courses the academic institutions try to estimate the percentage of successful students. But is it possible to predict the success rate of students…

  • Dotnet-Data MiningStudent Performance Analysis

    Student Performance Analysis

    0 out of 5
    4,500

    Student Performance Analysis Abstract?Student Performance Analysis. A good Automating Student Performance Analysis system will automate user?s activities, processes and practices, as well as increase their ability to handle a greater capacity of events. This is an efficient Automating Student Performance Analysis system software project that serves the functionality of an event manager. The event manager…

  • Subcarrier and Power Allocation for OFDMA-Based Cognitive Radio Systems With Joint Overlay and Underlay Spectrum Access Mechanism

    Subcarrier and Power Allocation for OFDMA-Based Cognitive Radio Systems With Joint Overlay and Underlay Spectrum Access Mechanism

    0 out of 5
    4,500

    Subcarrier and Power Allocation for OFDMA-Based Cognitive Radio Systems With Joint Overlay and Underlay Spectrum Access Mechanism Abstract?Subcarrier and Power Allocation for OFDMA-Based Cognitive Radio Systems With Joint Overlay and Underlay Spectrum Access Mechanism.In this paper, we study a subcarrier-and-power-allocation problem for orthogonal-frequency-division multiple-access (OFDMA)-based cognitive radio (CR) systems. In a departure from existing works…

  • Successive Interference Mitigation in Multiuser MIMO Channels

    Successive Interference Mitigation in Multiuser MIMO Channels

    0 out of 5
    4,500

    Successive Interference Mitigation in Multiuser MIMO Channels Abstract? Successive Interference Mitigation in Multiuser MIMO Channels. Motivated by the work of Dahrouj and Yu in applying the Han-Kobayashi transmission strategy for mitigating the intercell interference in a multi-cell multi-user multiple-input single-output Interference network MISO IN, < Final Year Projects 2016 > this paper considers splitting messages…

  • Matlab-Wirelessbased cognitive radio networks

    Sum capacity maximization for MIMO?OFDMA based cognitive radio networks

    0 out of 5
    3,500

    Sum capacity maximization for MIMO?OFDMA based cognitive radio networks Abstract? Sum capacity maximization for MIMO?OFDMA based cognitive radio networks. In the opportunistic Cognitive Radio (CR) networks, the secondary users? (SU) capacity is limited due to the need to avoid the primary users? (PUs) bands. The combination of the Multiple-Input Multiple-Output (MIMO) structure with the orthogonal…

  • Superpixel-Based Hand Gesture Recognition With Kinect Depth Camera

    Superpixel-Based Hand Gesture Recognition With Kinect Depth Camera

    0 out of 5
    4,500

    Superpixel-Based Hand Gesture Recognition With Kinect Depth Camera Abstract? Superpixel-Based Hand Gesture Recognition With Kinect Depth Camera. A new superpixel-based hand gesture recognition system based on a novel superpixel earth mover?s distance metric, together with Kinect depth camera. The depth and skeleton information from Kinect are effectively utilized to produce markerless hand extractio n. The…

  • Supervised Variational Model With Statistical Inference and Its Application in Medical Image Segmentation

    Supervised Variational Model With Statistical Inference and Its Application in Medical Image Segmentation

    0 out of 5
    4,500

    Supervised Variational Model With Statistical Inference and Its Application in Medical Image Segmentation Abstract? Automated and general medical image segmentation can be challenging because the foreground and the background may have complicated and overlapping density distributions in medical imaging. Conventional region-based level set algorithms often assume piecewise constant or piecewise smooth for segments, which are…

  • NS2Paradigm to Enhance the Security and Power Management for Mobile Grid Environment File name: PROJ5882-1.png

    Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment

    0 out of 5
    3,500

    Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment Abstract? Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment. Digital certificates and signatures provide protection in legally binding situations. Even though the digital certificates are used in banking and…

  • SWICOM: An SDR-Based Wireless Communication Gateway for Vehicles

    SWICOM: An SDR-Based Wireless Communication Gateway for Vehicles

    0 out of 5
    4,500

    SWICOM: An SDR-Based Wireless Communication Gateway for Vehicles Abstract? SWICOM: An SDR-Based Wireless Communication Gateway for Vehicles. A wide range of emerging and promising wireless communication protocols are rapidly being introduced into vehicles. They are commonly used for in-car infotainment, telematics, and safety applications. However, adopting new wireless communications into vehicles requires them to be…

End of content

End of content