Showing 1105–1116 of 1333 results

  • Salient Region Detection via High-Dimensional Color Transform and Local Spatial Support

    0 out of 5
    5,500

    Salient Region Detection via High-Dimensional Color Transform and Local Spatial Support Abstract? A novel approach to automatically detect salient regions in an image. Our approach consists of global and local features, which complement each other to compute a saliency map. The first key idea of our work is to create a saliency map of an…

  • Scalable Algorithms for Nearest-Neighbor Joins on Big Trajectory Data

    0 out of 5
    5,500

    Scalable Algorithms for Nearest-Neighbor Joins on Big Trajectory Data Abstract? Trajectory data are prevalent in systems that monitor the locations of moving objects. In a location-based service, for instance, the positions of vehicles are continuously monitored through GPS; the trajectory of each vehicle describes its movement history.We study joins on two sets of trajectories, generated…

  • Scalable Daily Human Behavioral Pattern Mining from Multivariate Temporal Data

    0 out of 5
    5,500

    Scalable Daily Human Behavioral Pattern Mining from Multivariate Temporal Data Abstract? This work introduces a set of scalable algorithms to identify patterns of human daily behaviors. These patterns are extracted from multivariate temporal data that have been collected from smartphones. We have exploited sensors that are available on these devices, and have identified frequent behavioral…

  • Scene Text Detection and Segmentation Based on Cascaded Convolution Neural Networks

    0 out of 5
    4,500

    Scene Text Detection and Segmentation Based on Cascaded Convolution Neural Networks Abstract-Scene text detection and segmentation are two important and challenging research problems in the field of computer vision. This paper proposes a novel method for scene text detection and segmentation based on cascaded convolution neural networks (CNNs). In this method, a CNN-based textaware candidate…

  • Scheduling Application In Android

    0 out of 5
    5,500

    Scheduling Application In Android Abstract-Android is open source based Linux kernel operating system mostly designed for touchscreen for mobile devices such as mobile phones and tablet computers. There are bunch of schedule android applications available today on play store providing static notification to user before a specified interval of time. The static notifications will not…

  • SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc Networks

    0 out of 5
    5,500

    SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc Networks Abstract?The issue of selecting routing paths with minimum end-to-end delay (E2ED) for nonsafety applications in urban vehicular adhoc networks (VANETs). Most existing schemes aim at reducing E2ED via greedy-based tech-niques < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code…

  • Search Engine

    0 out of 5
    6,500

    S3K: Search Engine Abstract?Abstract This project is aimed at developing a repository for Get information about Madurai surrounding. The Repository and Search Engine (RASE) is an Internet based application that can be accessed throughout the World.Anyone can access the search Engine to know about Madurai but can’t able to add.We can easily to find all…

  • Search Rank Fraud and Malware Detection in Google Play

    0 out of 5
    5,500

    Search Rank Fraud and Malware Detection in Google Play Abstract-In the first place, fraudulent behaviors in Google Play, the most popular Android app market, fuel search rank abuse and malware proliferation. To identify malware, previous work has focused on app executable and permission analysis. In addition, a novel system that discovers and leverages traces left…

  • Searchable Encryption over Feature-Rich Data

    0 out of 5
    5,500

    Searchable Encryption over Feature-Rich Data Abstract?Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File…

  • SecRBAC: Secure data in the Clouds

    0 out of 5
    5,500

    SecRBAC: Secure data in the Clouds Abstract? Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loos of control over their data and raises reasonable security concerns that slow down the…

  • Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks

    0 out of 5
    5,500

    Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks Abstract? the secrecy outage performance of transmit antenna selection (TAS)/maximal ratio combining (MRC) in multiple-input?multiple-output (MIMO) cognitive radio networks (CRNs) over Rayleigh fading channels. In the considered system, a secondary user (SU-TX) equipped with NA (NA ? 1) antennas uses TAS to…

  • Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage

    0 out of 5
    4,500

    Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage Abstract-Cloud storage facilitates both individuals and enterprises to cost effectively share their data over the Internet.However,this also brings difficult challenges to the access control of shared data since few cloud servers can be fully trusted. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach that enables…

End of content

End of content