Showing 133–144 of 247 results

  • Placeholder

    Implementation of Real Time Dress-up System based on Image Blending

    0 out of 5
    4,500

    Implementation of Real Time Dress-up System based on Image Blending Abstract? Implementation of high performance multi-camera / multi-sensor imaging systems that are required to produce real-time video output pose a large number of unique challenges to conventional digital design based on general-purpose processors or GPUs.< Final Year Projects > In potential application areas ranging from…

  • Placeholder

    Improved Additive-Wavelet Image Fusion

    0 out of 5
    4,500

    Improved Additive-Wavelet Image Fusion Abstract?Effective image-fusion methods inject the necessary geometric information and preserve the radiometric information. To preserve the radiometric information, the injected high frequency of a panchromatic (pan) image must follow the frequency of the multispectral (MS) image. In this letter,< Final Year Projects > an improved additive-wavelet (AW) fusion method is presented…

  • Placeholder

    Improving the Separability of Motor Imagery EEG Signals Using a Cross Correlation-Based Least Square Support Vector Machine for Brain?Computer Interface

    0 out of 5
    4,500

    Improving the Separability of Motor Imagery EEG Signals Using a Cross Correlation-Based Least Square Support Vector Machine for Brain?Computer Interface Abstract?Although brain-computer interface (BCI) techniques have been developing quickly in recent decades, there still exist a number of unsolved problems, such as improvement of motor imagery (MI) signal classification. < Final Year Projects > In…

  • Incentive Driven Information Sharing in Delay Tolerant Mobile Networks

    0 out of 5
    4,500

    Incentive Driven Information Sharing in Delay Tolerant Mobile Networks Abstract?Mobile wireless devices (e.g., smartphones, PDAs, and notebooks) play important roles in our daily life, e.g., users often use such devices for bank transactions, keep in touch with friends. Users can also store such information and share with one another via opportunistic peer to peer links….

  • Infected Fruit Part Detection Using K-Means Clustering Segmentation Technique

    0 out of 5
    4,500

    Infected Fruit Part Detection Using K-Means Clustering Segmentation Technique Abstract?Nowadays, overseas commerce has increased drastically in many countries. Plenty fruits are imported from the other nations such as oranges, apples etc. Manual identification of defected fruit is very time consuming. This work presents a novel defect segmentation of fruits based on color features with K-means…

  • Information-Theoretic Outlier Detection for Large-Scale Categorical Data

    0 out of 5
    4,500

    Information-Theoretic Outlier Detection for Large-Scale Categorical Data Abstract? Outlier detection can usually be considered as a pre-processing step for locating, in a data set, those objects that do not conform to well-defined notions of expected behavior. It is very important in data mining for discovering novel or rare events, anomalies, vicious actions, exceptional phenomena, etc….

  • INTELLIGENT LOAD-FREQUENCY CONTROL IN A DEREGULATED ENVIRONMENT: CONTINUOUS-VALUED INPUT, EXTENDED CLASSIFIER SYSTEM APPROACH

    0 out of 5
    4,500

    INTELLIGENT LOAD-FREQUENCY CONTROL IN A DEREGULATED ENVIRONMENT: This study presents an intelligent solution for load-frequency control in a restructured power system using a modified traditional frequency response model, suitable for a bilateral-based deregulation policy. The new approach is based on an extended classifier system with continuous-valued inputs (XCSR) which is the most successful learning classifier…

  • Placeholder

    JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques

    0 out of 5
    4,500

    JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques Abstract?Blind steganalysis of JPEG images is addressed by modeling the correlations among the DCT coefficients using K -variate (K ? 2) p.d.f. estimates (p.d.f.s) constructed by means of Markov random field (MRF) cliques. < Final Year Project >The reasoning of using high variate p.d.f.s together…

  • key management for multiple multicast groups in wireless networks

    0 out of 5
    4,500

    key management for multiple multicast groups in wireless networks Abstract? The emergence of diverse group-based services, multiple multicast groups are likely to coexist in a single network, and users may subscribe to multiple groups simultaneously. However,< Final Year Project > the existing group key management (GKM) schemes, aiming to secure communication within a single group,…

  • Library management using android

    0 out of 5
    4,500

    Library management using android   Abstract? Library management using android Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On Demand * Remote…

  • Lightweight Location Verification Algorithms for Wireless Sensor Networks

    0 out of 5
    4,500

    Lightweight Location Verification Algorithms for Wireless Sensor Networks Abstract? The knowledge of sensors’ locations is crucial information for many applications in Wireless Sensor Networks (WSNs). When sensor nodes are deployed in hostile environments, the localization schemes are vulnerable to various attacks, e.g., wormhole attack, pollution attack, range enlargement/reduction attack, and etc. Therefore, sensors’ locations are…

  • Placeholder

    Lossy Compression and Iterative Reconstruction for Encrypted Image

    0 out of 5
    4,500

    Lossy Compression and Iterative Reconstruction for Encrypted Image Abstract?This work proposes a novel scheme for lossy compression of an encrypted image with flexible compression ratio. A pseudorandom permutation is used to encrypt an original image, and the encrypted data are efficiently compressed by discarding the excessively rough and fine information of coefficients generated from orthogonal…

End of content

End of content