"Data leakage detection using watermarking" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 6 of 50 - About 500 Essays
  • Powerful Essays

    Power Theft Detection

    • 2905 Words
    • 12 Pages

    deregulation‚ free customer choice and open market competition occur in the energy supply sector. Power line communication has many new service possibilities on the data transferring via power lines without use extra cables. AMR is a very important application in these possibilities due to every user connected each other via modems using power lines. AMR is a technique to facilitate remote readings energy consumption. Improving the electrical power supply to households as a big issue. The government

    Premium Electric power transmission Electricity distribution Electrical engineering

    • 2905 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    ABSTRACT Title of Document: Multispectral Method for Apple Defect Detection using Hyperspectral Imaging System Tao Tao‚ Master of Science‚ 2011 Directed By: Dr. Gang Qu‚ Associate Professor Hyperspectral imaging is a non-destructive detection technology and a powerful analytical tool that integrates conventional imaging and spectroscopy to get both spatial and spectral information from the objects for food safety and quality analysis. A recently developed hyperspectral imaging system

    Premium Hyperspectral imaging

    • 12040 Words
    • 49 Pages
    Good Essays
  • Powerful Essays

    IEEE/OSA/IAPR International Conference on Informatics‚ Electronics & Vision Accident Detection and Reporting System using GPS‚ GPRS and GSM Technology Md. Syedul Amin‚ Jubayer Jalil Department of Electrical‚ Electronic and Systems Engineering Universiti Kebangsaan Malaysia 43600 UKM‚ Bangi‚ Selangor‚ Malaysia M. B. I. Reaz Department of Electrical‚ Electronic and Systems Engineering Universiti Kebangsaan Malaysia 43600 UKM‚ Bangi‚ Selangor‚ Malaysia email: mamun.reaz@gmail.com Abstract— Speed

    Premium Global Positioning System GSM

    • 1682 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Error Detection and Correction Transmission of data through a noisy medium inevitably introduces errors through interference by changing one or more bits. There are two types of errors‚ in single bit errors‚ a 0 may be turned into a 1 or vice versa. In real world conditions‚ most interference introduce burst errors where two or more bits are switched from a 0 to a 1 and vice versa. Types of Errors 1. Single-Bit Error – a single bit is switched from a 0 to a 1 or a 1 to a 0 2. Burst Error

    Premium Error detection and correction

    • 1736 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Systems (IJRES) Vol. 1‚ No. 2‚ July 2012‚ pp. 49~54 ISSN: 2089-4864 49 Vehicle Accident Automatic Detection and Remote Alarm Device Varsha Goud*‚ V.Padmaja** *Department of ECE‚ VNR VJIET‚ Hyderabad‚ AP‚ INDIA ** Department of ECE‚ VNR VJIET‚ Hyderabad‚ AP‚ INDIA Article Info Article history: Received Mar 23‚ 2012 Revised Jul 2‚ 2012 Accepted Jul 12‚ 2012 Keyword: accident automatic detection micro electro mechanical system remote alarm device vehicle ABSTRACT The Rapid growth of technology

    Premium Management Marketing Strategic management

    • 2796 Words
    • 12 Pages
    Satisfactory Essays
  • Good Essays

    Questionnaire design and analysing the data using SPSS Questionnaire design. page 1 For each decision you make when designing a questionnaire there is likely to be a list of points for and against just as there is for deciding on a questionnaire as the data gathering vehicle in the first place. Before designing the questionnaire the initial driver for its design has to be the research question‚ what are you trying to find out. After that is established you can address the issues of how best

    Premium SPSS Question Statistical survey

    • 3423 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Time series analysis (Session – I) Commands and syntax for data analysis using STATA 1. Open and Run the STATA application • Click on the Data on the task bar and open Data editor • Copy the data from Excel sheet and paste it on the data editor • Preserve the data • Close Data Editor 2. Type “describe” in the command space- Software will show the description of the data set. 3. Graphs i) To Draw a scatter plot of variables

    Premium Statistics Time series analysis Time series

    • 1247 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    com/locate/eswa Cluster analysis using data mining approach to develop CRM methodology to assess the customer loyalty Seyed Mohammad Seyed Hosseini *‚ Anahita Maleki‚ Mohammad Reza Gholamian Industrial Engineering Department‚ Iran University of Science and Technology‚ Tehran‚ Iran a r t i c l e i n f o a b s t r a c t Data mining (DM) methodology has a tremendous contribution for researchers to extract the hidden knowledge and information which have been inherited in the data used by researchers.

    Premium Marketing Customer relationship management

    • 3704 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Edge Image Detection

    • 3673 Words
    • 15 Pages

    INFORMATION PAPER International Journal of Recent Trends in Engineering‚ Vol. 1‚ No. 2‚ May 2009 Edge Detection Techniques for Image Segmentation – A Survey of Soft Computing Approaches N. Senthilkumaran1 and R. Rajesh2 School of Computer Science and Engineering‚ Bharathiar University‚ Coimbatore -641 046‚ India. 1 senthilkumaran@ieee.org‚ 2kollamrajeshr@ieee.org logical reasoning[1]. It has been applied to image processing in many ways[19]. Segmentation aims at dividing pixels into similar

    Premium Image processing Neural network Artificial intelligence

    • 3673 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Fraud Detection System

    • 13075 Words
    • 64 Pages

    Computer and Information Science; Vol. 7‚ No. 2; 2014 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education A Fraud Detection System Based on Anomaly Intrusion Detection Systems for E-Commerce Applications Daniel Massa1 & Raul Valverde2 1 Information Technology and Services‚ Betsson‚ Malta 2 John Molson School of Business‚ Concordia University‚ Montreal‚ Canada Correspondence: Raul Valverde‚ John Molson School of Business‚ Concordia University‚ Montreal‚ QC.‚

    Premium World Wide Web Fraud Credit card fraud

    • 13075 Words
    • 64 Pages
    Powerful Essays
Page 1 2 3 4 5 6 7 8 9 10 50