Since the surge in popularity of Android smartphones, creating Android applications and using location data in these applications have soared. Due to how quickly Android applications are being created, it is difficult for Continue reading
Get Latest Final Year Computer Projects in your Email
A Situation Analysis of the Security Awareness at Software Vendors and How to Best Inform Them About the Microsoft Security Development Lifecycle
In January 2002 Bill Gates sent out the renowned “Trustworthy Computing” memo where he announced that the company would shift their focus from adding new features and functionality to security and privacy. This was what led to the Continue reading
Burst Error Correcting Convolutional Codes for Broadband Wireless Transmission Systems
ABSTRACT:
This thesis presents high performance forward error correcting codes suitable for random and burst errors. It initially verifies the performance of burst error Continue reading
Data Synchronization Patterns in Mobile Application Design
ABSTRACT:
As Internet-enabled devices become more prevalent in the form of smartphones and tablets, the need for mobile application development patterns grows in importance. Different technologies, such as Nokia’s Symbian, Apple’s iOS, Google’s Android, and Microsoft’s Windows Mobile, have arisen Continue reading
Openface: An Open Source Facial Behavior Analysis Toolkit
ABSTRACT:
Over the past few years, there has been an increased interest in automatic facial behavior analysis and understanding. We present OpenFace an open source tool intended for computer vision and machine learning Continue reading
Secure Data Aggregation for Sensor Networks in the Presence of Collusion Attack Using Local Outlier Factor
ABSTRACT:
Aggregation of data from multiple sensor nodes is usually done by simple methods such as averaging or, more sophisticated, iterative filtering methods. However, such aggregation methods are highly vulnerable to malicious Continue reading
Face Recognition using Principle Component Analysis
The Principal Component Analysis (PCA) is one of the most successful techniques that have been used in image recognition and compression. PCA is a statistical method under the broad title of factor analysis. The purpose of PCA is to reduce the large Continue reading
Dynamic Remote Data Auditing for Securing Big Data Storage in Cloud Computing
Cloud computing has emerged as a new computing paradigm that offers great potential for storing data remotely. Presently, many organizations have reduced the burden of local data storage and maintenance by outsourcing data storage to the Continue reading
Remote Electrocardiogram Monitoring based on the Internet
Telemedicine is producing a great impact in the monitoring of patients located in remote nonclinical environments such as homes, military bases, ships, and the like. A number of applications, ranging from data collection, to chronic patient surveillance, and even to the Continue reading
Network and Device Forensic Analysis of Android Social-messaging Applications
In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android. We were able to reconstruct some or the Continue reading
Automatic Status Logger For a Gas Turbine
The Company Siemens Industrial Turbo Machinery AB manufactures and launches in operation among other things gas turbines, steam turbines, compressors, turn-key power Continue reading