Showing 145–156 of 440 results

  • Current Minimizing Torque Control of the IPMSM Using Ferrari?s Method

    0 out of 5
    4,500

    Current Minimizing Torque Control of the IPMSM Using Ferrari?s Method Abstract? Current Minimizing Torque Control of the IPMSM Using Ferrari?s Method. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • Customized Policies for Handling Partial Information in Relational Databases

    0 out of 5
    4,500

    Customized Policies for Handling Partial Information in Relational Databases Abstract?Most real-world databases have at least some missing data. Today, users of such databases are ?on their own? in terms of how they manage this incompleteness. In this paper, we propose the general concept of partial information policy (PIP) operator to handle incompleteness in relational databases.<...

  • Data Mining for Xml Query-Answering Support

    0 out of 5
    4,500

    Data Mining for Xml Query-Answering Support Abstract? Extracting information from semistructured documents is a very hard task, and is going to become more and more critical as the amount of digital information available on the Internet grows. Indeed, documents are often so large that the data set returned as answer to a query may be…

  • Data Mining with Big Data

    0 out of 5
    4,500

    Data Mining with Big Data, Big data is a collection of datasets which are so large and complex. Data sets are growing day by day and sharing, transfer, capture, storage, etc. are the main challenges in Big Data. Data mining discovers patterns from a large data set. Data mining with Big data is a complex…

  • Decentralized Access control with Anonymous Authentication of Data Store in clouds

    0 out of 5
    4,500

    Decentralized Access control with Anonymous Authentication of Data Store in clouds. Decentralized storage system for accessing data with anonymous authentication provides more secure user authentication, user revocation and prevents replay attacks. Access control is processed on decentralized KDCs it is being more secure for data encryption. Generated decentralized KDC’s are then grouped by (KGC). Our…

  • Decision Trees for Mining Data Streams Based on the McDiarmid?s Bound

    0 out of 5
    4,500

    ?Decision Trees for Mining Data Streams Based on the McDiarmid?s Bound Abstract? Decision Trees for Mining Data Streams Based on the McDiarmid?s Bound.In mining data streams the most popular tool is the Hoeffding tree algorithm. It uses the Hoeffding’s bound to determine the smallest number of examples needed at a node to select a splitting…

  • Depth Estimation of Face Images Using the Nonlinear Least-Squares Model

    0 out of 5
    4,500

    Depth Estimation of Face Images Using the Nonlinear Least-Squares Model   Abstract? we propose an efficient algorithm to reconstruct the 3D structure of a human face from one or more of its 2D images with different poses. In our algorithm, the nonlinear least-squares model is first employed to estimate the depth values of facial feature…

  • Design and Simulation of Photovoltaic super system using simulink

    0 out of 5
    4,500

    Design and Simulation of Photovoltaic super system using simulink   Abstract?Static synchronous compensators (STATCOMs) have been widely used for voltage support over the past decade, to improve power quality and voltage stability. However, STATCOMs are limited in their ability to improve the system stability margin due to their restricted capability for delivering real power.< Final…

  • Design of discrete fourier transform modulated filter bank with sharp transition band

    0 out of 5
    4,500

    Design of discrete fourier transform modulated filter bank with sharp transition band   Abstract?The authors consider a high-performance discrete Fourier transform (DFT)-modulated finite impulse response (FIR) filter bank with sharp transition width. The design of this filter bank is very expensive by the standard method, and hence the frequency response masking (FRM) technique is developed so…

  • Detecting and Locating Faulty Nodes in Smart Grids Based on High Frequency Signal Injection

    0 out of 5
    4,500

    Detecting and Locating Faulty Nodes in Smart Grids Based on High Frequency Signal Injection Abstract?An on-line method for detecting and locating a faulty node in the utility grid is proposed for smart grids. The method is based on injection of high frequency (A-Band) current signal into the grid that would impose voltages (less than 1V…

  • Detection and Classification of Apple Fruit Diseases using Complete Local Binary Patterns

    0 out of 5
    4,500

    Detection and Classification of Apple Fruit Diseases using Complete Local Binary Patterns   Abstract? Diseases in fruit cause devastating problem in economic losses and production in agricultural industry worldwide. In this paper, a solution for the detection and classification of apple fruit diseases is proposed and experimentally validated.< Final Year Projects > The image processing…

  • Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

    0 out of 5
    4,500

    Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Abstract? Detection and Localization of Multiple Spoofing Attackers in Wireless Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

End of content

End of content