Showing 2089–2100 of 2138 results

  • Placeholder

    Using PSO in a spatial domain based image hiding scheme

    0 out of 5
    4,500

    Using PSO in a spatial domain based image hiding scheme Abstract?Using PSO in a spatial domain based image hiding scheme. In this paper, we propose a new scheme of data hiding of encrypted images for the purpose of verifying the reliability of an image into both encrypted and spatial domains. This scheme couples the Quantization…

  • Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing

    0 out of 5
    4,500

    Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing Abstract? Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing. Cloud computing enables users to consume various < Final Year Projects 2016 > IT resources in an on-demand manner, and with low management overhead. However, customers can face…

  • Vampire attacks: Draining life from wireless ad-hoc sensor networks

    0 out of 5
    4,500

    Vampire attacks: Draining life from wireless ad-hoc sensor networks Images Abstract? Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. < Final Year Project > Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores…

  • Placeholder

    VANET-Based Secure and Privacy-Preserving Navigation

    0 out of 5
    4,500

    VANET-Based Secure and Privacy-Preserving Navigation Abstract? VANET-Based Secure and Privacy-Preserving Navigation. In this paper, we propose a navigation scheme that utilizes the online road information collected by a vehicular ad hoc network (VANET) to guide the drivers to desired destinations in a real-time and distributed manner. The proposed scheme has the advantage of using real-time…

  • Placeholder

    VChunkJoin: An Efficient Algorithm for Edit Similaerity Join

    0 out of 5
    4,500

    VChunkJoin: An Efficient Algorithm for Edit Similaerity Join Abstract? VChunkJoin: An Efficient Algorithm for Edit Similaerity Join. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ]…

  • VEGAS: Visual influEnce GrAph Summarization on Citation Networks

    0 out of 5
    4,500

    VEGAS: Visual influEnce GrAph Summarization on Citation Networks Abstract? VEGAS: Visual influEnce GrAph Summarization on Citation Networks. Visually analyzing citation networks poses challenges to many fields of the data mining research. How can we summarize a large citation graph according to the user?s interest? In particular, how can we illustrate the impact of a highly…

  • vehicle management in college

    0 out of 5
    3,500

    vehicle management in college Abstract?The Lummi tribal school (a native american school) teaches grades K-12. The Lummi tribe has less of a presence in colleges today than they would like and are working to change this. As part of this effort, < Final Year Projects > the Western Washington University Engineering Technology Department and the…

  • Vehicle Management System

    0 out of 5
    4,500

    Vehicle Management System Abstract? Abstract: Vehicle Management System can be defineds ‘learning facilitated and supported through the use of information and communications technology’. It can cover a spectrum of activities from the use of technology to support learning as part of a ?blended? approach (a combination of traditional and Vehicle Management System approaches),to learning that…

  • Vehicle Mobility and Communication Channel Models for Realistic and Efficient Highway VANET Simulation

    0 out of 5
    4,500

    Vehicle Mobility and Communication Channel Models for Realistic and Efficient Highway VANET Simulation Abstract? Vehicle Mobility and Communication Channel Models for Realistic and Efficient Highway VANET Simulation. Developing real-time safety and non-safety applications for vehicular ad hoc networks (VANETs) requires understanding the dynamics of the network topology characteristics since these dynamics determine both the performance…

  • VeMAC: A TDMA-Based MAC Protocol for Reliable Broadcast in VANETs

    0 out of 5
    4,500

    VeMAC: A TDMA-Based MAC Protocol for Reliable Broadcast in VANETs Abstract? VeMAC: A TDMA-Based MAC Protocol for Reliable Broadcast in VANETs. The need of a medium access control (MAC) protocol for an efficient broadcast service is of great importance to support the high-priority safety applications in vehicular ad hoc networks (VANETs). < Final Year Projects...

  • Verifiable Auditing for Outsourced Database in Cloud Computing

    0 out of 5
    4,500

    Verifiable Auditing for Outsourced Database in Cloud Computing Abstract? Verifiable Auditing for Outsourced Database in Cloud Computing. The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider < Final Year Projects 2016 > CSP that provides various database services to different users. Recently, plenty of research…

  • Placeholder

    Versatile Size-l Object Summaries for Relational Keyword Search

    0 out of 5
    4,500

    Versatile Size-l Object Summaries for Relational Keyword Search Abstract? Versatile Size-l Object Summaries for Relational Keyword Search. The Object Summary (OS)is a recently proposed tree structure, which summarizes all data held in a relational database about a data subject. An OS can potentially be < Final Year Projects > very large in size and therefore…

End of content

End of content