Showing 433–444 of 2259 results

  • Authenticated Subgraph Similarity Search in Outsourced Graph Databases

    Authenticated Subgraph Similarity Search in Outsourced Graph Databases

    0 out of 5
    4,500

    Authenticated Subgraph Similarity Search in Outsourced Graph Databases Abstract?Subgraph similarity search is used in graph databases to retrieve graphs whose subgraphs are similar to a given query graph. It has been proven successful in a wide range of applications including bioinformatics and chem-informatics, etc. Due to the cost of providing efficient similarity search services on…

  • Authentication  Using Captcha As Graphical Password

    Authentication Using Captcha As Graphical Password

    0 out of 5
    4,500

    Authentication Using Captcha As Graphical Password Abstract?Authentication Using Captcha As Graphical Password. Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been under-explored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel…

  • Authentication for Session Password Using Color and Images

    Authentication for Session Password Using Color and Images

    0 out of 5
    4,500

    Authentication for Session Password Using Color and Images Abstract? Authentication for Session Password Using Color and Images. Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources until the…

  • Authorized Data Transfer using Key Classification

    Authorized Data Transfer using Key Classification

    0 out of 5
    3,500

    Authorized Data Transfer using Key Classification Abstract?Authorized Data Transfer using Key Classification. The goal of interaction between human and computer is to find a way to treat it like human-human interaction. Gestures play an important role in human’s daily life in order to transfer data and human emotions. The gestures are results of part of…

  • Auto emergency alert using android

    Auto emergency alert using android

    0 out of 5
    3,500

    Auto emergency alert using android Abstract?In the real world, patient has to be monitored by the person present in the home or by the helpers. There is no automatic alerting system being implemented so far. In this paper, the condition of the Patient is fully monitored with the help of Micro-Electro Mechanical System (MEMS), Heart…

  • Automated Fiducial Localization in CT Images Based on Surface Processing and Geometrical Prior Knowledge for Radiotherapy Applications

    Automated Fiducial Localization in CT Images Based on Surface Processing and Geometrical Prior Knowledge for Radiotherapy Applications

    0 out of 5
    4,500

    Automated Fiducial Localization in CT Images Based on Surface Processing and Geometrical Prior Knowledge for Radiotherapy Applications   Abstract? We propose a novel method for radio-opaque external marker localization in CT scans for infrared (IR) patient set-up in radiotherapy. Efforts were focused on the quantification of uncertainties in marker localization in the CT dataset as…

  • AUTOMATED GLAUCOMA DETECTION USING HYBRID FEATURE EXTRACTION IN RETINAL FUNDUS IMAGES

    AUTOMATED GLAUCOMA DETECTION USING HYBRID FEATURE EXTRACTION IN RETINAL FUNDUS IMAGES

    0 out of 5
    4,500

    AUTOMATED GLAUCOMA DETECTION USING HYBRID FEATURE EXTRACTION IN RETINAL FUNDUS IMAGES   Abstract?Glaucoma is one of the most common causes of blindness. Robust mass screening may help to extend the symptom-free life for affected patients. To realize mass screening requires a cost-effective glaucoma detection method which integrates well with digital medical and administrative processes. To…

  • Automated Localization of Cysts in Diabetic Macular Edema using Optical Coherence Tomography Images

    Automated Localization of Cysts in Diabetic Macular Edema using Optical Coherence Tomography Images

    0 out of 5
    4,500

    Automated Localization of Cysts in Diabetic Macular Edema using Optical Coherence Tomography Images Abstract? A novel automated system that localizes cysts in optical coherence tomography (OCT) images of patients with diabetic macular edema (DME). First, in each image, six sub-retinal layers are detected using an iterative high-pass filtering approach.< Final Year Project > Next, significantly…

  • Automated Phrase Mining from Massive Text Corpora

    Automated Phrase Mining from Massive Text Corpora

    0 out of 5
    4,500

    Automated Phrase Mining from Massive Text Corpora Abstract-As one of the fundamental tasks in text analysis, phrase mining aims at extracting quality phrases from a text corpus and has various downstream applications including information extraction/retrieval, taxonomy construction, and topic modeling. Most existing methods rely on complex, trained linguistic analyzers, and thus likely have unsatisfactory performance…

  • Automated Question Answering using Semantic Web Services

    Automated Question Answering using Semantic Web Services

    0 out of 5
    4,500

    Automated Question Answering using Semantic Web Services Abstract? Question answering(QA) can vastly improve the quality and effectiveness of knowledge acquisition on the Web. Web search provides a list of documents targeted based on the keywords coined by the users; users need to investigate further the documents to obtain the very knowledge they wanted. QA can…

  • Automated Real-Time Detection of Potentially Suspicious Behavior in Public Transport Areas

    Automated Real-Time Detection of Potentially Suspicious Behavior in Public Transport Areas

    0 out of 5
    4,500

    Automated Real-Time Detection of Potentially Suspicious Behavior in Public Transport Areas   Abstract?Detection of suspicious activities in public transport areas using video surveillance has attracted an increasing level of attention. In general, automated offline video processing systems have been used for post-event analysis, such as forensics and riot investigations. However, very little has been achieved…

  • Automated Student Performace Analysis

    Automated Student Performace Analysis

    0 out of 5
    3,500

    Automated Student Performace Analysis   Abstract? Automated Student Performace Analysis. With the increase of ubiquitous data all over the internet, intelligent classroom systems that integrate traditional learning techniques with modern e-learning tools have become quite popular and necessary today. Although a substantial amount of work has been done in the field of e-learning, specifically in…

End of content

End of content