Showing 169–180 of 440 results

  • Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment.

    0 out of 5
    4,500

    Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment.Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from resource multiplexing through virtualization technology. In this paper, we present a system that uses virtualization technology to allocate data…

  • DYNAMIC STABILITY OF A MICROGRID WITH AN ACTIVE LOAD

    0 out of 5
    4,500

    DYNAMIC STABILITY OF A MICROGRID WITH AN ACTIVE LOAD Abstract?Rectifiers and voltage regulators acting as constant power loads form an important part of a microgrid?s total load. In simplified form, they present a negative incremental resistance and beyond that, they have control loop dynamics in a similar frequency range to the inverters that may supply…

  • E-Crime file management application for android

    0 out of 5
    4,500

    E-Crime file management application for android Abstract? E-Crime file management application for android. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On…

  • EAACK?A Secure Intrusion-Detection System for MANETs

    0 out of 5
    4,500

    EAACK?A Secure Intrusion-Detection System for MANETs Abstract? EAACK?A Secure Intrusion-Detection System for MANETs. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On…

  • Ear and Fingerprint Biometrics for Personal Identification

    0 out of 5
    4,500

    Ear and Fingerprint Biometrics for Personal Identification   Abstract? Ear and Fingerprint Biometrics for Personal Identification. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice…

  • Early Detection and Prediction of Lung Cancer Survival using Neural Network Classifier

    0 out of 5
    4,500

    Early Detection and Prediction of Lung Cancer Survival using Neural Network Classifier   Abstract?A new computer-aided diagnosis (CAD) system for early lung cancer detection based on the analysis of sputum color images is proposed. A set of features is extracted from the nuclei of the sputum cells after applying a region detection process. For training…

  • EEG Signal Classification using Wavelet and classifier

    0 out of 5
    4,500

    EEG Signal Classification using Wavelet and classifier   Abstract? The quality of feature set obtained from Wavelet based Energy-entropy with variation of scale and wavelet type. Here motor imagery of left-right hand movement classification problem has been studied. Elliptic bandpass filters are used to discard unwanted signals and also to extract alpha & beta rhythms.<…

  • Effect of load power factor on voltage stability of distribution substation

    0 out of 5
    4,500

    Effect of load power factor on voltage stability of distribution substation   Abstract? voltage stability of the distribution substation is analyzed by simulation. It is shown that the operating voltage of the distribution substation bus is cross point of the power grid transmission characteristics and the load reactive power – voltage characteristics. The research results…

  • Effective content-based video retrieval using pattern-indexing and matching techniques

    0 out of 5
    4,500

    Effective content-based video retrieval using pattern-indexing and matching techniques Abstract?To retrieve videos from database, effective video analyzing, indexing and retrieval techniques are required. < Final Year Project >Video retrieval using query-by-image is not successful as it gives result of videos with less relevancy and accuracy. A method is proposed where input is a video clip,…

  • Effective detection of diabetes using a PSO and k-nearst neighbour approach

    0 out of 5
    4,500

    Effective detection of diabetes using a PSO and k-nearst neighbour approach   Abstract?Effective detection of diabetes using a PSO and k-nearst neighbour approach Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections]…

  • Effficient Quality Analysis Of MRI Image Using Preprocessing Techniques

    0 out of 5
    4,500

    Effficient Quality Analysis Of MRI Image Using Preprocessing Techniques   Abstract?mage pre-processing techniques are used to improve the quality of an image before processing into an application. This uses a small neighborhood of a pixel in an input image to get a new brightness value in the output image. These preprocessing techniques are also called…

  • Efficient Construction for Region Incrementing Visual Cryptography

    0 out of 5
    4,500

    Efficient Construction for Region Incrementing Visual Cryptography Abstract?A region incrementing visual cryptography scheme (RIVCS) deals with the sharing of an image consisting of multiple regions with different secrecy levels, which can be incrementally revealed as the number of shares increases. < Final Year Project >The encoding basis matrices of RIVCS for an image containing three…

End of content

End of content