Showing 1525–1536 of 2067 results

  • Principal Component Analysis for Hyperspectral Image Classification

    Principal Component Analysis for Hyperspectral Image Classification

    0 out of 5
    4,500

    Principal Component Analysis for Hyperspectral Image Classification   Abstract? we have applied supervised probabilistic principal component analysis (SPPCA) and semi-supervised probabilistic principal component analysis (S2PPCA) for feature extraction in hyperspectral remote sensing imagery.< Final Year Projects > The two models are all based on probabilistic principal component analysis (PPCA) using EM learning algorithm. SPPCA only…

  • Priority-Based Consolidation of Parallel Workloads in the Cloud

    Priority-Based Consolidation of Parallel Workloads in the Cloud

    0 out of 5
    4,500

    Priority-Based Consolidation of Parallel Workloads in the Cloud Abstract? Priority-Based Consolidation of Parallel Workloads in the Cloud. The cloud computing paradigm is attracting an increased number of complex applications to run in remote data centers. Many complex applications require parallel processing capabilities. Parallel applications of certain nature often show a decreasing utilization of CPU resources…

  • Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing

    Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing

    0 out of 5
    4,500

    Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing   Abstract? To improve the accuracy of learning result, in practice multiple parties may collaborate through conducting joint Back-Propagation neural network learning on the union of their respective data sets. During this process no party wants to disclose her/his private data to others. Existing…

  • Privacy preserving data sharing with AIDA

    Privacy preserving data sharing with AIDA

    0 out of 5
    4,500

    Privacy preserving data sharing with AIDA Abstract?Privacy preserving data sharing with AIDA. This paper describes the problem of Privacy Preserving data Mining Data mining is the process of extracting hidden information in the database. The current trend in business colaboration shares the data mine results gain mutual benefits of. < Final Year Projects > Privacy…

  • Privacy preserving in location based queries

    Privacy preserving in location based queries

    0 out of 5
    4,500

    Privacy preserving in location based queries Abstract?Privacy preserving in location based queries. With the pervasiveness of location-aware mobile electronic devices and the advances of wireless communications, location-based services (LBS), which can help people enjoy a convenient life, has attracted considerable interest recently. However, < Final Year Projects > the privacy issues of LBS are still…

  • Privacy Preserving Key Exchange Over Internet

    Privacy Preserving Key Exchange Over Internet

    0 out of 5
    4,500

    Privacy Preserving Key Exchange Over Internet Abstract?Privacy Preserving Key Exchange Over Internet. Key-exchange, in particular Diffie-Hellman key-exchange (DHKE), is among the core cryptographic mechanisms for ensuring network security. For key-exchange over the Internet, both security and privacy are desired. In this paper, we develop a family of privacy-preserving authenticated DHKE protocols named deniable Internet key-exchange…

  • Privacy Preserving Multi-Factor Authentication with Biometrics

    Privacy Preserving Multi-Factor Authentication with Biometrics

    0 out of 5
    3,500

    Privacy Preserving Multi-Factor Authentication with Biometrics Abstract? An emerging approach to the problem of identity theft is represented by the adoption of biometric authentication systems. Such systems however present several challenges, related to privacy, reliability and security of the biometric data. Inter-operability is also required among the devices used for authentication. Moreover, very often biometric…

  • Privacy Preserving Policy-Based Content Sharing in Public Clouds

    Privacy Preserving Policy-Based Content Sharing in Public Clouds

    0 out of 5
    4,500

    Privacy Preserving Policy-Based Content Sharing in Public Clouds Abstract? An important problem in public clouds is how to selectively share documents based on fine-grained attribute-based access control policies (acps).< Final Year Project > An approach is to encrypt documents satisfying different policies with different keys using a public key cryptosystem such as attribute-based encryption, and/or…

  • Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing

    Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing

    0 out of 5
    5,500

    Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing Abstract?popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing chain of medical data mainly includes data collection, data storage an data sharing, etc. < final year projects > Video…

  • Privacy Protection for Wireless Medical Sensor Data

    Privacy Protection for Wireless Medical Sensor Data

    0 out of 5
    4,500

    Privacy Protection for Wireless Medical Sensor Data Abstract? Privacy Protection for Wireless Medical Sensor Data. In recent years, wireless sensor networks have been widely used in healthcare applications, such as hospital and home patient monitoring. Wireless medical sensor networks are more < Final Year Projects 2016 > to eavesdropping, modi?cation, impersonation and replaying attacks than…

  • Privacy Protection for Wireless Medical Sensor Data

    Privacy Protection for Wireless Medical Sensor Data

    0 out of 5
    4,500

    Privacy Protection for Wireless Medical Sensor Data Abstract? Privacy Protection for Wireless Medical Sensor Data. In recent years, wireless sensor networks have been widely used in healthcare applications, such as hospital and home patient monitoring. Wireless medical sensor networks are more vulnerable to eavesdropping,< Final Year Projects 2016 > modification, impersonation and replaying attacks than…

  • Privacy Protection for Wireless Medical Sensor Data

    Privacy Protection for Wireless Medical Sensor Data

    0 out of 5
    4,500

    Privacy Protection for Wireless Medical Sensor Data Abstract? wireless sensor networks have been widely used in healthcare applications, such as hospital and home patient monitoring. Wireless medical sensor networks are more vulnerable to eavesdropping, modi?cation, impersonation and replaying attacks than the wired networks. A lot of work has been done to secure wireless medical sensor…

End of content

End of content