Morphological openings and closings are useful for the smoothing of grayscale images. However, their use for image noise reduction is limited by their tendency to remove important, thin features from an image along with the noise. This paper is a Continue reading
Get Latest Final Year Computer Projects in your Email
Flexible Data Dissemination Strategy for Effective Cache Consistency in Mobile Wireless Communication Networks
In mobile wireless communication network, caching data items at the mobile clients is important to reduce the data access delay. However, efficient cache invalidation strategies are used to Continue reading
SDCI: Scalable Distributed Cache Indexing for Cache Consistency for Mobile Environments
In this paper, we suggest a new cache consistency maintenance scheme, namely Scalable distributed cache indexing for Cache Consistency (SDCI), for mobile Continue reading
Fingerprint Verification based on Fusion of Minutiae and Ridges using Strength Factors
With the increasing emphasis on the automatic personal identification applications, biometrics especially fingerprint identification is the most reliable and widely accepted Continue reading
Data Leakage Detection – 2
This paper contains the results of implementation of Data Leakage Detection Model. Currently watermarking technology is being used for the data protection. But this technology doesn’t provide the complete security against Continue reading
Java FTP Proxy Server
Java FTP Proxy Server acts as an application-level FTP proxy server. It allows computers inside a firewall to connect to computers outside a firewall, and vice versa. It is also capable of acting as a Continue reading
Efficient Search in P2P Networks with 8-Point Hypercircles
This report concerns the implementation of a simulation framework to evaluate an emerging peer-to-peer network topology scheme using 8-point hypercircles, entitled HyperCircle. This topology was proposed in order to alleviate some of the drawbacks of Continue reading
Modeling and Detection of Camouflaging Worm
Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation, and thus, pose great challenges to Continue reading
Modelling and Detection of Camouflaging Worms – A Survey
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer network. Active worm’s is also one type of worm which causes Continue reading
Facial Recognition using Eigenfaces by PCA
Face recognition systems have been grabbing high attention from commercial market point of view as well as pattern recognition field. It also stands high in researchers community. Face recognition have been fast growing, challenging and interesting area in Continue reading
Face Recognition Algorithms
The goal of this ”proyecto fin de carrera” was to produce a review of the face detection and face recognition literature as comprehensive as possible. Face detection was included as a unavoidable preprocessing step for face recogntion, and as an issue by itself, because it Continue reading