Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization Abstract?Online social networks have gained significant popularity recently. The Location-Based Social Networks (LBSNs) are a special kind of online social networks in which people can share location-embedded information. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation…
Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization Abstract? Online social networks have gained significant popularity recently. The problem of influence maximization in online social networks has been extensively studied. However, in prior works, influence propagation in the physical world, which is also an indispensable factor, is not considered. The Location-Based Social…
Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Abstract? Quality of cloud service (QoS) is one of the crucial factors for the success of cloud providers in mobile cloud computing. Context-awareness is a popular method for automatic awareness of the mobile environment and choosing the most suitable cloud provider. Lack of context information may…
Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Abstract?Using Crowdsourcing to Provide QoS for Mobile Cloud Computing.Quality of cloud service QoS < Final Year Projects 2016 > is one of the crucial factors for the success of cloud providers in mobile cloud computing. Context-awareness is a popular method for automatic awareness of the mobile…
Using Data Mining Techniques for Detecting Terror-Related Activities on the Web Abstract? Using Data Mining Techniques for Detecting Terror-Related Activities on the Web. An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior (?profile?) of terrorists by applying a data…
Using Dependency Structures for Prioritization of Functional Test Suites Abstract?Test case prioritization is the process of ordering the execution of test cases to achieve a certain goal, such as increasing the rate of fault detection. Increasing the rate of fault detection can provide earlier feedback to system developers, improving fault fixing activity and, ultimately, software…
Using Facebook for Image Steganography Abstract? Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held devices running iOS, Android, or Windows Phone), it would…
Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for credit card fraud detection Abstract-With the growing usage of credit card transactions, financial fraud crimes have also been drastically increased leading to the loss of huge amounts in the finance industry. Having an efficient fraud detection method has become a necessity for all banks in…
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds Abstract?Recent research has provided evidence indicating how a malicious user could perform coresidence profiling and public-to-private IP mapping to target and exploit customers which share physical resources. The attacks rely on two steps: resource placement on the target?s physical machine and…
Using PSO in a spatial domain based image hiding scheme Abstract?Using PSO in a spatial domain based image hiding scheme. In this paper, we propose a new scheme of data hiding of encrypted images for the purpose of verifying the reliability of an image into both encrypted and spatial domains. This scheme couples the Quantization…
Using Sentimental Analysis in Prediction of Stock Market Investment Abstract?AbstractSentimental Analysis is one of the most popular technique which is widely been used in every industry. Extraction of sentiments from user?s comments is used in detecting the user view for a particular company. Sentimental Analysis can help in predicting the mood of people which affects…
Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing Abstract? Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing. Cloud computing enables users to consume various < Final Year Projects 2016 > IT resources in an on-demand manner, and with low management overhead. However, customers can face…