Web Based Meeting Scheduling Abstract?Abstract This project is aimed at developing a scheduler for group meeting. This is a Web Based tool. The purpose of this system is to support the organization in scheduling meetings by determining each meeting’s request, date and location. The System monitor meetings, plan meetings under constraints expressed by participants, reschedule…
PIS: Web Based Recruitment Abstract?Abstract Today’s emerging technology and tight labour market have incited a stampede to electronic recruiting.In this project we demonstrate a prototype solution in which we built a dedicated website for job seekers, students, or graduates on one hand, and potential employers on the other, the aim is to enable them reach…
Weighted Level Set Evolution Based on Local Edge Features for Medical Image Segmentation Abstract– Level set methods have been widely used to implement active contours for image segmentation applications due to their good boundary detection accuracy. In the context of medical image segmentation, weak edges and inhomogeneities remain important issues that may hinder the accuracy…
Weighted Sum-Rate Maximization for MIMO Downlink Systems Powered by Renewables Abstract? Optimal resource management for smart grid powered multi-input multi-output (MIMO) systems is of great importance for future green wireless communications. A novel framework is put forth to account for the stochastic renewable energy sources (RES), dynamic energy prices, as well as random wireless channels….
Weighted Svm With Classification Uncertainty For Small Training Samples Abstract?Existing maximum-margin support vector machines (SVMs) generate a hyperplane which produces the clearest separation between positive and negative feature vectors. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively Abstract-Ciphertext-policy attribute-based encryption (CP-ABE) has been proposed to enable fine-grained access control on encrypted data for cloud storage service. In the context of CP-ABE, since the decryption privilege is shared by multiple users who have the same attributes, it…
Wide-Range Adaptive RF-to-DC Power Converter for UHF RFIDs Abstract? A wide-range, differential, cross-coupled rectifier is proposed with an extended dynamic range of input RF power that enables wireless powering from varying distances. The proposed architecture mitigates the reverse-leakage problem in conventional, cross-coupled rectifiers without degrading sensitivity. A prototype is designed for UHF RFID applications, and…
Wind Turbine Accidents: A Data Mining Study Abstract– While the global production of wind energy is increasing, there exists a significant gap in the academic and practice literature regarding the analysis of wind turbine accidents.With this intension, presents the results obtained from the analysis of 240 wind turbine accidents from around the world. The main…
Workflow Transformation for Real-Time Big Data Processing Abstract?Abstract With the explosion of big data, processing and analyzing large numbers of continuous data streams in real-time,such as social media stream, sensor data streams, log streams,stock exchanges streams, etc., has become a crucial requirement for many scientific and industrial applications in recent years.Increased volume of streaming data…
Workload modeling for resource usage analysis and simulation in cloud computing Abstract-In the first place, workload modeling enables performance analysis and simulation of cloud resource management policies, which allows cloud providers to improve their systems? Quality of Service (QoS) and researchers to evaluate new policies without deploying expensive large scale environments. However, workload modeling is…
Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks Abstract-Today search engines are tightly coupled with social networks, and present users with a double-edged sword: they are able to acquire information interesting to users but are also capable of spreading viruses introduced by hackers. It is challenging to characterize how a…