Pandemic Disease Monitoring Tool Using Twitter Data
A tool is developed to retrieve the tweets from Twitter using generic terms used in discussion for a disease selected.
A tool is developed to retrieve the tweets from Twitter using generic terms used in discussion for a disease selected.
CHAPTER 1
INTRODUCTION
1.1 Introdu
SOCIAL ENGINEERING ATTACKS
While social engineering is closely related with cybersecurity today, it is not restricted to vulnerabilities of computer and network systems. Several established practices
The purpose of this project is to understand the concept of Binary Space Partitioning (BSP) and implement one of its applications – hidden surface removal.
The focus of this project is to create a question generation system which will generate Multiple choice questions, Fill in the blanks questions, True and false questions as well as Wh- questions (i.e Who, where, which, how).
There are different types of UAV shapes, mechanisms, configurations, and characteristics. Since UAVs have been developed for specific purposes, its hardware and software depend upon the specific task
Table of Contents
Introduction
1. Data Exfiltration Analysis
Packet 1 to 15
1.1. ARP Request
1.2. Packet 49 – 62
1.3.Inbound & Outbound Emails
1.4.Uploading to external services
1.5. ICMP an
This paper presents an extensive review of global thresholding techniques for image segmentation including various methods used for global threshold selection of grey level images.
Localization approaches in general require inputs from multiple sensors and a solid data fusion technique in order to achieve accurate results.
The Technical Stuff – How the internet works
Contents
Task 1
P1 – Outline the web architecture and components which enable internet and web functionality.
Introduction
What is the internet?
H
This is the era of “Cloud Computing”. In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive. In the pa
Comments:
Table of Contents
Aim and Objectives…………………………………………………………
Introduction to a dissertation aiming to reduce the research gap by developing fast, scalable iterative clustering algorithms that converges faster having higher performance with better accuracy and reduced error rate.
The primary purpose of the work described in this report was to provide a complete environment which allows computer science students the integration of theory with practice for a malware module.
This project presents the development of an algorithm for radar pulse signal acquisition and parameters interception. Radar pulse parameters extraction is an important processing stage in the electronic warfare (EW) receivers.
Software Defined Network
Table of Contents
Software Defined Network……………………………………..
ABSTRACT………
1 INTRODUCTION
1.1 Introduction to MANETs
MANET known as Mobile Ad-Hoc Network is a self-organised, dynamic and infrastructure less network. MANET consists of mobile nodes that roam freely, every
The objective of this paper is to build a wireless gesture control robot using Arduino, accelerometer, RF transmitter and receiver module.
Design of an Android application to provide students with access to past exam papers to help with exam preparation.
This project aims to provide a solution based on whether implementing penetration testing tools; downloaded from third-party software can have the least issues by evaluating how we can test either of two web servers, such as Apache and IIS.

Subscribe
Join our email list to receive the latest updates and valuable discounts.