Search for an essay or resource:

Intrusion detection systems (IDS)

CHAPTER I INTRODUCTION Computer networks are playing a principal role in lots of areas. The increasing measurement and complexity of networks result in the growth of complexity of their protection analysis. Viable fiscal, political, and different advantages, which can be received with the aid of cyber assaults, lead to tremendous increase of the quantity of … Read more


(10) Presented evolutionary algorithm as efficient techniques used to take care of optimization faults, in which the search is divided into three groups: evolutionary programming, genetics algorithm and evolutionary strategies. These heuristics have been generally utilized because of their relative preferences to other optimization techniques, for example, they don’t require a predefined kind of objective … Read more

Develop low cost solution for monitoring transformer health condition and controlling its parameter

ABSTRACT Transformer is an electrical static device which transfers electrical energy from one circuit to another circuit without changing the frequency through electromagnetic induction. It is very important device in transmission and distribution of electricity. It is necessary to monitor it, before occurrence of any problem. There are some critical parameters for e.g. Voltage, current, … Read more

CRISPR-Cas for bacterial communities

There is an academic demand to drive research into the use of genetic engineering techniques in metagenomics for enhanced biodegradation Yu2013 of micropollutants in wastewater, especially using the novel CRISPR-Cas (Clustered Regularly Interspaced Short Palindromic Repeats and CRISPR associated) system for genome manipulation in bacterial communities. The CRISPR-Cas systems requires a custom single-guide RNA (sgRNA … Read more


Nowadays online process systems are utilized everywhere throughout the web. One of the online process systems is the online sales and inventory system. It became convenient in every aspect of businesses. Every process data are required details of the costumers such as Items purchased, price list and date, using sales and inventory system can benefit … Read more

Design a system to extract ontology from unstructured information sources for enhancing user search results

Abstract With the fast growth of information volume through the World Wide Web causes an increasing requirement to develop new automatic system for retrieval of documents and ranking them according to their relevance to the user query. There are many search engines available out there. Most of the search engines are hit based which is … Read more

Data mining and Twitter

INTRODUCTION Data analysis for twitter using clustering and classification involves different techniques of data mining, web mining and algorithms used. Data mining is also called knowledge discovery in databases (KDD). It is commonly defined as the process of discovering useful patterns or knowledge from data sources, e.g., databases, texts, images, the Web, etc. The patterns … Read more

bio-metric authentication systems

Abstract: Distributing software and hardware components of a bio-metric authentication system over hosts linked by a network introduces additional challenges compared to developing a centralised system. Among these, fault tolerance and network transfer resilience are of particular importance. Specifically, transmission of data over IP networks is not without flaws: overflowing router queues, parallelised data streams, … Read more

Wireless Sensor Networks

Abstract A Wireless Sensor Network is the gathering of vast number of sensor nodes, that are technically or financially doable and measure the encompassing condition in nature encompassing them. The distinction between common wireless Networks and WSNs is that sensors are delicate to energy utilization (energy consumption). The majority of the consideration is given to … Read more

Face tracking

Abstract: – Face Tracking is an important & challenging research area in the field of computer vision & image processing. Tracking is the method of identification, the position of the moving object in the video. Identifying the face is much more challenging task & then tracking the facial features in a moving video. Facial features … Read more

AI Classifiers

INTRODUCTION My task is produce an output decision based on a dataset that I was given. I am going to use machine learning to experiment with the data using various classifier and then report on the best classifier approach. This report will be about comparing classifiers and offering an insight into why I have taken … Read more

Cyber attacks – attribution

The development in any attribution documentation for cyber related attacks, is to review all information from collected digital evidence to any other pertinent facts founds. While the topic is broad in nature, we will review a cyber attack that was perpetrated from ally countries and third world countries. However, after further investigation found to be … Read more

Artificial intelligence

INTRODUCTION Technology is one of the most important things in human civilization. In this modern era, the development of technology is growing rapidly. In everyday life, people are increasingly in need of technology assistance in their activities. Therefore, in technological development, artificial intelligence required as a supporting component to realize the desired technology. According to … Read more

Database of Online-ordering system

This database is designed for the online ordering system. Auditing is on to recording who delete the table, also views and VPD are used as security reason. Cold backup and hot backup to protect the data. Some table using partitioning to provide a better performance of backup and data-read. There are also use XML and … Read more


Spectre relies on a generalised idea of memory management, instead of targeting on specific feature of the processor. For example, when speculative execution is performed that accesses memory, it could depend on private data, which could cause the data cache to become vulnerable for attacks through a side channel. The attacker can use timing attack … Read more

Implement a Biometric access control system

1 Project context The written assignment is based on a project at a large company with more than 10 thousand employees. The company has a head office and multiple branches spread across the country. The goal of the project was to implement a Biometric access control system for gaining access to buildings, corridors and even … Read more

HUMAN action recognition

I. INTRODUCTION HUMAN action recognition has become one of the very important topics on the field of pattern recognition especially due to its continually growing use in modern applications in everyday life. Automated crowd surveillance, smart houses and assistive environments, gaming, automated sport analysis, human-machine interaction and others are examples of such applications. The problem … Read more


The 177 Internet Service Providers (ISPs) in the Philippines offering their services to the country boosted the internet users range to 33.6 million. With a large growth contributed by internet cafes which lead to increase number of small and medium enterprises (SMEs).For many years, Philippines has been considered as a haven for crime committed online … Read more

Information anonymisation

Abstract—Data security and privacy of data is one of the major concerns now days. Distributed computing is the most predominant worldview in late patterns for registering purposes as well as putting away purposes. In the distributed computing Information security and protection of information is one of the significant worry. Information isolation has been broadly examined … Read more

Deep Architectures

Introduction and related work: Permitting computing agent to model our reality all around ok to display what we call intelligence has been the center of more than a large portion of a century of exploration. To accomplish this, unmistakably a vast amount of data about our reality ought to by one means or another be … Read more