Showing 1045–1056 of 1075 results

  • Unsupervised Feature Selection with Controlled Redundancy (UFeSCoR)

    0 out of 5
    4,500

    Unsupervised Feature Selection with Controlled Redundancy (UFeSCoR) Abstract? Unsupervised Feature Selection with Controlled Redundancy (UFeSCoR). Features selected by a supervised / unsupervised technique often include redundant or correlated features. While use of correlated features may result in an increase in the design and decision making cost, removing redundancy completely can make the system vulnerable to…

  • Unusual Event Detection in Low Resolution Video for enhancing ATM security

    0 out of 5
    4,500

    Unusual Event Detection in Low Resolution Video for enhancing ATM security Abstract? In real world applications, tracking target in low resolution video is a challenging task because there is loss of discriminative detail in the visual appearance of moving object. The existing methods are mostly based on the enhancement of LR (low resolution) video by…

  • User-Defined Privacy Grid System for Continuous Location-Based Services

    0 out of 5
    4,500

    User-Defined Privacy Grid System for Continuous Location-Based Services Abstract? User-Defined Privacy Grid System for Continuous Location-Based Services. Location-based services < Final Year Projects 2016 > require users to continuously report their location to a potentially untrusted serverto obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques for…

  • Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment

    0 out of 5
    4,500

    Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment Abstract? Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment. Infrastructure as a Service < Final Year Projects 2016 > IaaS clouds provide virtual machines(VMs) under a pay-per-use business model, which can be used to create a dynamically…

  • Using Crowdsourcing to Provide QoS for Mobile Cloud Computing

    0 out of 5
    4,500

    Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Abstract?Using Crowdsourcing to Provide QoS for Mobile Cloud Computing.Quality of cloud service QoS < Final Year Projects 2016 > is one of the crucial factors for the success of cloud providers in mobile cloud computing. Context-awareness is a popular method for automatic awareness of the mobile…

  • Using Data Mining Techniques for Detecting Terror-Related Activities on the Web

    0 out of 5
    4,500

    Using Data Mining Techniques for Detecting Terror-Related Activities on the Web Abstract? Using Data Mining Techniques for Detecting Terror-Related Activities on the Web. An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior (?profile?) of terrorists by applying a data…

  • Placeholder

    Using Facebook for Image Steganography

    0 out of 5
    4,500

    Using Facebook for Image Steganography Abstract? Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held devices running iOS, Android, or Windows Phone), it would…

  • Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing

    0 out of 5
    4,500

    Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing Abstract? Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing. Cloud computing enables users to consume various < Final Year Projects 2016 > IT resources in an on-demand manner, and with low management overhead. However, customers can face…

  • VEGAS: Visual influEnce GrAph Summarization on Citation Networks

    0 out of 5
    4,500

    VEGAS: Visual influEnce GrAph Summarization on Citation Networks Abstract? VEGAS: Visual influEnce GrAph Summarization on Citation Networks. Visually analyzing citation networks poses challenges to many fields of the data mining research. How can we summarize a large citation graph according to the user?s interest? In particular, how can we illustrate the impact of a highly…

  • vehicle management in college

    0 out of 5
    3,500

    vehicle management in college Abstract?The Lummi tribal school (a native american school) teaches grades K-12. The Lummi tribe has less of a presence in colleges today than they would like and are working to change this. As part of this effort, < Final Year Projects > the Western Washington University Engineering Technology Department and the…

  • Vehicle Management System

    0 out of 5
    4,500

    Vehicle Management System Abstract? Abstract: Vehicle Management System can be defineds ‘learning facilitated and supported through the use of information and communications technology’. It can cover a spectrum of activities from the use of technology to support learning as part of a ?blended? approach (a combination of traditional and Vehicle Management System approaches),to learning that…

  • Vehicle Mobility and Communication Channel Models for Realistic and Efficient Highway VANET Simulation

    0 out of 5
    4,500

    Vehicle Mobility and Communication Channel Models for Realistic and Efficient Highway VANET Simulation Abstract? Vehicle Mobility and Communication Channel Models for Realistic and Efficient Highway VANET Simulation. Developing real-time safety and non-safety applications for vehicular ad hoc networks (VANETs) requires understanding the dynamics of the network topology characteristics since these dynamics determine both the performance…

End of content

End of content