Travel & Tourism Abstract?Travel & Tourism. With the advent of Leisure Economy Times and the popularization of cars, besides being used for daily commute and business travel, private cars are playing an important role in recreational activities on weekends and holidays which is called urban self-driving tourism in China. To understand the behavioral characteristics of…
Tree Leaves Extraction in Natural Images: Comparative Study of Preprocessing Tools and Segmentation Methods Abstract? Tree Leaves Extraction in Natural Images: Comparative Study of Preprocessing Tools and Segmentation Methods. we propose a comparative study of various segmentation methods applied to the extraction of tree leaves from natural images. This study follows the design of a…
TREE-METRICS GRAPH CUTS FOR BRAIN MRI SEGMENTATION WITH TREE CUTTING Abstract?We tackle the problem of brain MRI image segmentation using the tree-metric graph cuts (TM) algorithm, a novel image segmentation algorithm, and introduce a ?tree-cutting? method to interpret the labeling returned by the TM algorithm as tissue classification for the input brain MRI image. The…
Trigger-Wave Asynchronous Cellular Logic Array for Fast Binary Image Processing Abstract? Trigger-Wave Asynchronous Cellular Logic Array for Fast Binary Image Processing. The design and the VLSI implementation of an asynchronous cellular logic array for fast binary image processing. The proposed processor array employs trigger wave propagation and collision detection mechanisms for binary image skeletonization, and…
Trinity on using trinary tree Abstract?Trinity on using trinary tree. Web data extractors are used to extract data from web documents in order to feed automated processes. In this article, we propose a technique that works on two or more web documents generated by the same server-side template and learns a regular expression that models…
Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction Abstract? Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction. Web data extractors are used to extract data from web documents in order to feed automated processes. In this article, we propose a technique that works on two or more web documents generated by…
Trip-Point Bit-Line Precharge Sensing Scheme for Single-Ended SRAM Abstract? Trip-Point Bit-Line Precharge Sensing Scheme for Single-Ended SRAM. A trip-point bit-line precharge TBP sensing scheme is proposed for high-speed single-ended static random-access memory (SRAM). < Final Year Project 2016 > This TBP scheme mitigates the issues of limited performance, power, sensing margin, and area found in…
TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Abstract? TRIP: An Interactive Retrieving-Inferring Data Imputation Approach. Data < Final Year Projects 2016 > aims at ?lling in missing attribute values in databases. Most existing imputation methods to string attribute values are inferring-based approaches, which usually fail to reach a high imputation recall by just inferring missing…
TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Abstract? : TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Data imputation aims at ?lling in missing attribute values in databases. Most existing imputation methods to string attribute values are inferring-based approaches, which usually fail to reach a high imputation recall by just inferring missing values from the complete…
Trust and Compactness in Social Network Groups Abstract? Trust and Compactness in Social Network Groups. Understanding the dynamics behind group formation and evolution in social networks is considered an instrumental milestone to better describe how individuals gather and form communities, how they enjoy and share the platform contents, how they are driven by their preferences/tastes,…
Trust and Compactness in Social Network Groups Abstract? Trust and Compactness in Social Network Groups. Understanding the dynamics behind group formation and evolution in social networks is considered an instrumental milestone to better describe how individuals gather and form communities, how < Final Year Projects 2016 > enjoy and share the platform contents, how they…
Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Abstract? Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage.Cloud data storage has provided significant benefits by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud, cryptographic…