Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their Continue reading
Get Latest Final Year Computer Projects in your Email
Image Enhancement and Minutiae Matching in Fingerprint Verification
Fingerprint image enhancement and minutiae matching are two key steps in an automatic fingerprint identification system. In this paper, we develop a fingerprint image enhancement algorithm based on Continue reading
Architecture for Secure SCADA and Distributed Control System(DCS) Networks
Industrial control systems are an integral part of the critical infrastructures of electric, water, oil/gas, chemicals, pipelines, and transportation. The capabilities of networking these systems provide Continue reading
Improving Clustering of Gene Expression Patterns
The central question investigated in this project was whether clustering of gene expression patterns could be done more biologically accurate by providing the clustering technique with Continue reading
Remote-Controlled Home Automation Systems with Different Network Technologies
This paper describes an investigation into the potential for remote controlled operation of home automation systems. It considers problems with their implementation, discusses possible Continue reading
Detection of Annual Rings in Wood
This report describes an annual line detection algorithm for the WoodEye quality control system. The goal with the algorithm is to find the positions of annual lines on the four Continue reading
Distributed Case Based Reasoning for Intelligent Tutoring System: An Agent Based Student Modeling Paradigm
(ITS) is becoming very popular where the system models the student’s learning behavior and presents to the student the learning material (content, questions-answers, assignments) accordingly. In today’s distributed computing environment, the tutoring system can Continue reading
Fingerprint Verification
The use of fingerprints for identification has been employed in law enforcement for about a century. A much broader application of fingerprints is for personal authentication, for instance to Continue reading
Data Leakage Detection – 1
Perturbation is a very useful technique where the data is modified and made ‘less sensitive ́ before being handed to agents. For example, one can add random noise to certain attributes, or one can Continue reading
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the Continue reading
CTG Carbon Calculator in ASP.Net
A carbon dioxide emission calculator for buildings created by the U.S.-based company CTG Energetics, Inc. and based on a Excel file has been converted to a ASP.NET / SQL Server web application. Carbon dioxide emissions are calculated using Continue reading