Showing 637–648 of 2014 results

  • Dotnet Project

    Custmer Relationship in Banks

    0 out of 5
    3,500

    Custmer Relationship in Banks Abstract? Custmer Relationship in Banks. In this paper, taking companies listed on China’s GEM (Growth Enterprises Market) as samples from 2012 to 2014, we test the role of corporate governance in bank credit decision. By examining the influence of corporate governance on bank loan financing capacity, we found that corporate governance…

  • Customizable Point-of-Interest Queries in Road Networks

    Customizable Point-of-Interest Queries in Road Networks

    0 out of 5
    4,500

    Customizable Point-of-Interest Queries in Road Networks Abstract?Customizable Point-of-Interest Queries in Road Networks. We present a unified framework for dealing with exact point-of-interest < Final Year Projects 2016 > POI queries in dynamic continental road networks within interactive applications.We show that partition-based algorithms developed for point-to-point shortest path computations can be naturally extended to handle augmented…

  • Customized computer-aided application mapping on NoC infrastructure using multi-objective optimization

    Customized computer-aided application mapping on NoC infrastructure using multi-objective optimization

    0 out of 5
    4,500

    Customized computer-aided application mapping on NoC infrastructure using multi-objective optimization Abstract? Customized computer-aided application mapping on NoC infrastructure using multi-objective optimization. Network-on-chip (NoC) are considered the next generation of communication infrastructure, which will be omnipresent in most of industry, office and personal electronic systems. In the platform-based methodology, < Final Year Projects > an application…

  • Java Projects—Data Mining

    Customized Policies for Handling Partial Information in Relational Databases

    0 out of 5
    4,500

    Customized Policies for Handling Partial Information in Relational Databases Abstract?Most real-world databases have at least some missing data. Today, users of such databases are ?on their own? in terms of how they manage this incompleteness. In this paper, we propose the general concept of partial information policy (PIP) operator to handle incompleteness in relational databases.<...

  • Java Projects—Data Mining

    Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control

    0 out of 5
    4,500

    Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Abstract?A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots…

  • DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks

    DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks

    0 out of 5
    4,500

    DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks Abstract?DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks. Data uploading time constitutes a large portion of mobile data gathering time in wireless sensor networks.By equipping < Final Year Projects 2016 > multipleantennas on the mobile…

  • Java Projects—Networking

    DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party

    0 out of 5
    4,500

    DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party Abstract?Off-site data storage is an application of cloud that relieves the customers from focusing on data storage system. However, outsourcing data to a third-party administrative control entails serious security concerns. Data leakage may occur due to attacks by other users and machines in the cloud….

  • .NET Projects - cloud Computing

    DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party

    0 out of 5
    4,500

    DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party Abstract?Off-site data storage is an application of cloud that relieves the customers from focusing on data storage system. However, outsourcing data to a third-party administrative control entails serious security concerns. Data leakage may occur due to attacks by other users and machines in the cloud….

  • .NET Projects - cloud Computing

    Data as a Currency and Cloud-Based Data Lockers

    0 out of 5
    4,500

    Data as a Currency and Cloud-Based Data Lockers Abstract? Monetization strategies that are apparent to consumers include virtual goods, in-app purchases, and advertising-supported models, as the increasing number of pop-ups, pop-unders, banners, mobile, text-based, in-game, and other ad types makes clear. Such ads can be used not only to sell products and services directly, but…

  • Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling

    Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling

    0 out of 5
    4,500

    Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling Abstract? Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling. We study data collection in an energy renewable sensor network for scenarios such as traffic monitoring on busy highways, where sensors are deployed along a predefined path < Final Year Projects 2016 > the…

  • Data Encoding Techniques for Reducing Energy Consumption in Network-on-Chip

    Data Encoding Techniques for Reducing Energy Consumption in Network-on-Chip

    0 out of 5
    4,500

    Data Encoding Techniques for Reducing Energy Consumption in Network-on-Chip Abstract?Data Encoding Techniques for Reducing Energy Consumption in Network-on-Chip As technology shrinks, the power dissipated by the links of a network-on-chip (NoC) starts to compete with the power dissipated by the other elements of the communication subsystem, namely, the routers and the network interfaces (NIs). <...

  • Matlab_Dip

    Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution

    0 out of 5
    4,500

    Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution Abstract?Digital video sometimes needs to be stored and processed in an encrypted format to maintain security and privacy. For the purpose of content notation and/or tampering detection, it is necessary to perform data hiding in these encrypted videos. In this way, data hiding in encrypted…

End of content

End of content