Showing 1933–1944 of 2025 results

  • Placeholder

    TREE-METRICS GRAPH CUTS FOR BRAIN MRI SEGMENTATION WITH TREE CUTTING

    0 out of 5
    4,500

    TREE-METRICS GRAPH CUTS FOR BRAIN MRI SEGMENTATION WITH TREE CUTTING Abstract?We tackle the problem of brain MRI image segmentation using the tree-metric graph cuts (TM) algorithm, a novel image segmentation algorithm, and introduce a ?tree-cutting? method to interpret the labeling returned by the TM algorithm as tissue classification for the input brain MRI image. The…

  • Placeholder

    Trees Cannot Lie: Using Data Structures for Forensics Purposes

    0 out of 5
    4,500

    Trees Cannot Lie: Using Data Structures for Forensics Purposes Abstract? Trees Cannot Lie: Using Data Structures for Forensics Purposes. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=”…

  • Trigger-Wave Asynchronous Cellular Logic Array for Fast Binary Image Processing

    0 out of 5
    4,500

    Trigger-Wave Asynchronous Cellular Logic Array for Fast Binary Image Processing Abstract? Trigger-Wave Asynchronous Cellular Logic Array for Fast Binary Image Processing. The design and the VLSI implementation of an asynchronous cellular logic array for fast binary image processing. The proposed processor array employs trigger wave propagation and collision detection mechanisms for binary image skeletonization, and…

  • Placeholder

    Trinity on using trinary tree

    0 out of 5
    4,500

    Trinity on using trinary tree Abstract?Trinity on using trinary tree. Web data extractors are used to extract data from web documents in order to feed automated processes. In this article, we propose a technique that works on two or more web documents generated by the same server-side template and learns a regular expression that models…

  • Placeholder

    Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction

    0 out of 5
    4,500

    Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction Abstract? Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction. Web data extractors are used to extract data from web documents in order to feed automated processes. In this article, we propose a technique that works on two or more web documents generated by…

  • Trip-Point Bit-Line Precharge Sensing Scheme for Single-Ended SRAM

    0 out of 5
    4,500

    Trip-Point Bit-Line Precharge Sensing Scheme for Single-Ended SRAM Abstract? Trip-Point Bit-Line Precharge Sensing Scheme for Single-Ended SRAM. A trip-point bit-line precharge TBP sensing scheme is proposed for high-speed single-ended static random-access memory (SRAM). < Final Year Project 2016 > This TBP scheme mitigates the issues of limited performance, power, sensing margin, and area found in…

  • TRIP: An Interactive Retrieving-Inferring Data Imputation Approach

    0 out of 5
    4,500

    TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Abstract? TRIP: An Interactive Retrieving-Inferring Data Imputation Approach. Data < Final Year Projects 2016 > aims at ?lling in missing attribute values in databases. Most existing imputation methods to string attribute values are inferring-based approaches, which usually fail to reach a high imputation recall by just inferring missing…

  • TRIP: An Interactive Retrieving-Inferring Data Imputation Approach

    0 out of 5
    4,500

    TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Abstract? : TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Data imputation aims at ?lling in missing attribute values in databases. Most existing imputation methods to string attribute values are inferring-based approaches, which usually fail to reach a high imputation recall by just inferring missing values from the complete…

  • Placeholder

    Trust and Compactness in Social Network Groups

    0 out of 5
    4,500

    Trust and Compactness in Social Network Groups Abstract? Trust and Compactness in Social Network Groups. Understanding the dynamics behind group formation and evolution in social networks is considered an instrumental milestone to better describe how individuals gather and form communities, how they enjoy and share the platform contents, how they are driven by their preferences/tastes,…

  • Trust and Compactness in Social Network Groups

    0 out of 5
    4,500

    Trust and Compactness in Social Network Groups Abstract? Trust and Compactness in Social Network Groups. Understanding the dynamics behind group formation and evolution in social networks is considered an instrumental milestone to better describe how individuals gather and form communities, how < Final Year Projects 2016 > enjoy and share the platform contents, how they…

  • Placeholder

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

    0 out of 5
    4,500

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Abstract? Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage.Cloud data storage has provided significant benefits by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud, cryptographic…

  • Placeholder

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

    0 out of 5
    4,500

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Abstract? Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage. Cloud data storage has provided signi?cant bene?ts by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud,…

End of content

End of content