Showing 1681–1692 of 1968 results

  • Selected Vehicle Tracking

    0 out of 5
    4,500

    Selected Vehicle Tracking Abstract?Selected Vehicle Tracking, Proportional Integral Derivative (PID) controller is a conventional controller, which is widely used in industrial control system. In this paper, a PID control system is used for path tracking of an autonomous surface vehicle (ASV). The PID controller is selected because it is easy to implement as an embedded…

  • Self-Adaptive Learning PSO-Based Deadline

    0 out of 5
    4,500

    Self-Adaptive Learning PSO-Based Deadline Abstract?Public clouds provide Infrastructure as a Service (IaaS) to users who do not own sufficient compute resources. IaaS achieves the economy of scale by multiplexing, and therefore faces the challenge of scheduling tasks to meet the peak demand while preserving Quality-of-Service (QoS). Previous studies proposed proactive machine purchasing or cloud federation…

  • Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters

    0 out of 5
    4,500

    Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters Abstract? Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters. The MapReduce framework and its open source implementation Hadoop have become the defacto platform for scalable analysis on large data sets in recent years. One of the primary concerns in Hadoop is how to minimize the…

  • Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks

    0 out of 5
    4,500

    Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks Abstract?Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…

  • Self-Supervised Online Metric Learning With Low Rank Constraint for Scene Categorization

    0 out of 5
    4,500

    Self-Supervised Online Metric Learning With Low Rank Constraint for Scene Categorization   Abstract?Conventional visual recognition systems usually train an image classifier in a bath mode with all training data provided in advance. However, in many practical applications, only a small amount of training samples are available in the beginning and many more would come sequentially…

  • Semantic Features Selection and Representation for Facial Image Retrieval System

    0 out of 5
    4,500

    Semantic Features Selection and Representation for Facial Image Retrieval System   Abstract? Most image retrieval methods are specialized for image based matching and retrieval based on low-level features. However, humans perceive facial images and compare their similarities using high-level features, such as the description and ranking of facial traits including gender, race, and age. In…

  • Semantic Link Network-Based Model for Organizing Multimedia Big Data

    0 out of 5
    4,500

    Semantic Link Network-Based Model for Organizing Multimedia Big Data Abstract?Semantic Link Network-Based Model for Organizing Multimedia Big Data. Recent research shows that multimedia resources in the wild are growing at a staggering rate. The rapid increase number of multimedia resources has brought an urgent need to < Final Year Projects > develop intelligent methods to…

  • Semantic security against web application attacks

    0 out of 5
    4,500

    Semantic security against web application attacks Abstract? Semantic security against web application attacks. Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. This paper focuses on internal timing attacks, a particularly dangerous class of timing attacks,…

  • Semantic Web Service Discovery Using Natural Language Processing Techniques

    0 out of 5
    4,500

    Semantic Web Service Discovery Using Natural Language Processing Techniques Abstract? the proliferation of available Web services, new approaches are needed to search for the most appropriate services matching user requirements. Existing UDDI based discovery techniques fail to recognize similarities and differences between Web service capabilities and thus greatly limit the scope of service discovery. Hence,…

  • Semantic Web service discovery using natural language processing techniques

    0 out of 5
    4,500

    Semantic Web service discovery using natural language processing techniques   Abstract? With the proliferation of available Web services, new approaches are needed to search for the most appropriate services matching user requirements. Existing UDDI based discovery techniques fail to recognize similarities and differences between Web service capabilities and thus greatly limit the scope of service…

  • Semantics Driven Approach for Knowledge Acquisition From EMRs

    0 out of 5
    4,500

    Semantics Driven Approach for Knowledge Acquisition From EMRs Abstract?Semantics Driven Approach for Knowledge Acquisition From EMRs. Semantic computing technologies have matured to be applicable to many critical domains such as national security, life sciences, and health care. However, the key to their success is the availability of a rich domain knowledge base. The creation and…

  • Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware

    0 out of 5
    4,500

    Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware Abstract? Recently, malware has increasingly become a critical threat to embedded systems, while the conventional software solutions, such as antivirus and patches, have not been so successful in defending the ever-evolving and advanced malicious programs. we propose a hard ware enhanced architecture, GuardOL, to perform…

End of content

End of content