Showing 133–144 of 440 results

  • Constructing a Global Social Service Network for Better Quality of Web Service Discovery

    0 out of 5
    4,500

    Constructing a Global Social Service Network for Better Quality of Web Service Discovery Abstract?Web services have had a tremendous impact on the Web for supporting a distributed service-based economy on a global scale. However, despite the outstanding progress, their uptake on a Web scale has been significantly less than initially anticipated. The isolation of services…

  • Content Based Color Image Classification using SVM

    0 out of 5
    4,500

    Content Based Color Image Classification using SVM   Abstract? We propose a novel approach for content based color image classification using Support Vector Machine (SVM).< Final Year Projects > Traditional classification approaches deal poorly on content based image classification tasks being one of the reasons of high dimensionality of the feature space. In this paper,…

  • Content-based image retrieval approach for biometric security using colour, texture and shape features controlled by fuzzy heuristics

    0 out of 5
    4,500

    Content-based image retrieval approach for biometric security using colour, texture and shape features controlled by fuzzy heuristics   Abstract?we discuss a new content-based image retrieval approach for biometric security, which is based on colour, texture and shape features and controlled by fuzzy heuristics. The proposed approach is based on the three well-known algorithms: colour histogram,…

  • Content-Based Image Retrieval with Graph Theoretic Approach

    0 out of 5
    4,500

    Content-Based Image Retrieval with Graph Theoretic Approach   Abstract? This letter introduces a novel unsupervised graph-theoretic approach in the framework of region-based retrieval of remote sensing (RS) images. The proposed approach is characterized by two main steps: (1) modeling each image by a graph, which provides region-based image representation combining both local information and related…

  • Continuous authentication, using behavioral biometrics, with keystroke and mouse

    0 out of 5
    4,500

    Continuous authentication, using behavioral biometrics, with keystroke and mouse   Abstract? CA continuous behaviometric authentication system is tested on 99 users over 10 weeks, focusing on keystroke dynamics, mouse movements, application usage, and the system footprint.< Final Year Project > In the process, a new trust model was created to enable continuous evaluation of the…

  • Control strategy of a cross-phase-connected unified power quality conditioner

    0 out of 5
    4,500

    Control strategy of a cross-phase-connected unified power quality conditioner Abstract?Control strategy of a cross-phase-connected unified power quality conditioner Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…

  • Coordinated Control of a DG and Voltage Control Devices Using a Dynamic Programming Algorithm

    0 out of 5
    4,500

    Coordinated Control of a DG and Voltage Control Devices Using a Dynamic Programming Algorithm   Abstract?A new control method, in which a distributed generator (DG) actively participates in steady-state voltage control, together with an under-load tap changer (ULTC) and shunt capacitors (Sh.Cs). In the conventional DG control method, the integration of DGs into a distribution…

  • Copyright Protection for E-Government Document Images

    0 out of 5
    4,500

    Copyright Protection for E-Government Document Images   Abstract?The proposed copyright protection scheme combines the discrete cosine transform (DCT) and singular value decomposition (SVD) using a control parameter to avoid the false-positive problem. In this article, we propose an efficient copyright protection scheme for e-government document images. First, we apply the discrete cosine transform (DCT) to…

  • Cortical Surface Reconstruction via Unified Reeb Analysis of Geometric and Topological Outliers in Magnetic Resonance Images

    0 out of 5
    4,500

    Cortical Surface Reconstruction via Unified Reeb Analysis of Geometric and Topological Outliers in Magnetic Resonance Images Abstract?we present a novel system for the automated reconstruction of cortical surfaces from T1-weighted magnetic resonance images. At the core of our system is a unified Reeb analysis framework for the detection and removal of geometric and topological outliers…

  • Cost Optimization of Elasticity Cloud Resource Subscription Policy

    0 out of 5
    4,500

    Cost Optimization of Elasticity Cloud Resource Subscription Policy   Abstract? In cloud computing, resource subscription is an important procedure which enables customers to elastically subscribe to IT resources based on their service requirements. Resource subscription can be divided into two categories, namely long-term reservation and on-demand subscription. Although customers need to pay the upfront fee…

  • Credit card transaction fraud detection Markov model

    0 out of 5
    4,500

    Credit card transaction fraud detection Markov model   Abstract? The most accepted payment mode is credit card for both online and offline in today’s world, it provides cashless shopping at every shop in all countries. It will be the most convenient way to do online shopping, paying bills etc. < Final Year Projects >Hence, risks…

  • Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks.

    0 out of 5
    4,500

    Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks.Wireless mesh networks (WMNs) have emerged as a flexible and low-cost network infrastructure, where heterogeneous mesh routers managed by different users collaborate to extend network coverage. This paper proposes a novel routing metric, Expected Forwarded Counter (EFW), and two further variants, to cope with the problem of…

End of content

End of content