Automobile Spare Shop(Android App) Abstract-Forecasts predict that Internet traffic will continue to grow in the near future. A huge share of this traffic is caused by multimedia streaming. The quality of experience (QoE) of such streaming services is an important aspect and in most cases the goal is to maximize the bit rate which?in some…
Steganography Based Content Retrieval in Cloud Computing Abstract-In a Cloud Security is updated for each and every day in an cloud environment the Security is updated for all type of cloud environments in our process focused on Cloud image Security In Recent years the some popular celebrities personal images are leaked from some social media…
Steganography encryption standard for android application Abstract?Abstract Information (or data) hiding process embeds data into digital media for the purpose of security. Steganography is one such technique in which presence of secret message cannot be detected and we can use it as a tool for security purpose to transmit the confidential information in a secure…
Steganography Using Reversible Texture Synthesis Abstract? Steganography Using Reversible Texture Synthesis. We propose a novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image, which synthesizes a new texture image with a similar local appearance and an arbitrary size. We weave the texture synthesis process into steganography…
Steganography Using Reversible Texture Synthesis Abstract?Steganography Using Reversible Texture Synthesis. A novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image,which synthesizes a new texture image with a similar local appearance and an arbitrary size. We weave the texture synthesis process into steganography to conceal secret messages….
Stegnography techniques to mitigate using Smar phone Application Abstract?By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, < Final Year Projects > attacks and hazards to profile…
Stochastic Geometry Study on Device-to-Device Communication as a Disaster Relief Solution Abstract?Abstract With the unprecedented new capabilities introduced by modern broadband wireless networks, public safety (PS) agencies are increasingly depending on such networks for their mission-critical communications. One of the key enablers for this adoption is the device-to-device (D2D) communications, where mobile devices can connect…
Stochastic-Geometry-Based Performance Analysis of Delayed Mobile Data Offloading With Mobility Prediction in Dense IEEE 802.11 Networks Abstract– Mobile data offloading through Wi-Fi is a promising solution to alleviate the explosive data increase in cellular network. While extensive attempts have been made at mobile data offloading, previous studies have rarely paid attention to network characteristics (e.g….
Stocks Market Prediction Using Support Vector Machine Abstract-A lot of studies provide strong evidence that traditional predictive regression models face significant challenges in out-of sample predictability tests due to model uncertainty and parameter instability. Recent studies introduce particular strategies that overcome these problems. Support Vector Machine (SVM) is a relatively new learning algorithm that has…
STOLEN MOBILE TRACKING Abstract?STOLEN MOBILE A novel paradigm to detect smartphone physical capture attacks is proposed. Using received signal strength indicator and general system problem solving framework, the paradigm recognizes indoors moving pattern of a phone user. Most existing approaches in detection of physical capture attacks focus on protecting the network not the device. This…
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage Abstract– Key exposure is one serious security problem for cloud storage auditing. In order to deal with this problem, cloud storage auditing scheme with key-exposure resilience has been proposed. However, in such a scheme, the malicious cloud might still forge valid authenticators later than the key-exposure time…
Structural Vulnerability Assessment of Community-based Routing in Opportunistic Networks Abstract?Opportunistic networks enable mobile devices to communicate with each other through routes that are built dynamically, while messages are en route between the sender and the destination(s). The social structure and interaction of users of such devices dictate the performance of routing protocols in those networks….