Showing 97–108 of 320 results

  • Content-based image retrieval approach for biometric security using colour, texture and shape features controlled by fuzzy heuristics

    0 out of 5
    4,500

    Content-based image retrieval approach for biometric security using colour, texture and shape features controlled by fuzzy heuristics   Abstract?we discuss a new content-based image retrieval approach for biometric security, which is based on colour, texture and shape features and controlled by fuzzy heuristics. The proposed approach is based on the three well-known algorithms: colour histogram,…

  • Content-Based Image Retrieval with Graph Theoretic Approach

    0 out of 5
    4,500

    Content-Based Image Retrieval with Graph Theoretic Approach   Abstract? This letter introduces a novel unsupervised graph-theoretic approach in the framework of region-based retrieval of remote sensing (RS) images. The proposed approach is characterized by two main steps: (1) modeling each image by a graph, which provides region-based image representation combining both local information and related…

  • Continuous authentication, using behavioral biometrics, with keystroke and mouse

    0 out of 5
    4,500

    Continuous authentication, using behavioral biometrics, with keystroke and mouse   Abstract? CA continuous behaviometric authentication system is tested on 99 users over 10 weeks, focusing on keystroke dynamics, mouse movements, application usage, and the system footprint.< Final Year Project > In the process, a new trust model was created to enable continuous evaluation of the…

  • Control strategy of a cross-phase-connected unified power quality conditioner

    0 out of 5
    4,500

    Control strategy of a cross-phase-connected unified power quality conditioner Abstract?Control strategy of a cross-phase-connected unified power quality conditioner Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…

  • Coordinated Control of a DG and Voltage Control Devices Using a Dynamic Programming Algorithm

    0 out of 5
    4,500

    Coordinated Control of a DG and Voltage Control Devices Using a Dynamic Programming Algorithm   Abstract?A new control method, in which a distributed generator (DG) actively participates in steady-state voltage control, together with an under-load tap changer (ULTC) and shunt capacitors (Sh.Cs). In the conventional DG control method, the integration of DGs into a distribution…

  • Copyright Protection for E-Government Document Images

    0 out of 5
    4,500

    Copyright Protection for E-Government Document Images   Abstract?The proposed copyright protection scheme combines the discrete cosine transform (DCT) and singular value decomposition (SVD) using a control parameter to avoid the false-positive problem. In this article, we propose an efficient copyright protection scheme for e-government document images. First, we apply the discrete cosine transform (DCT) to…

  • Cortical Surface Reconstruction via Unified Reeb Analysis of Geometric and Topological Outliers in Magnetic Resonance Images

    0 out of 5
    4,500

    Cortical Surface Reconstruction via Unified Reeb Analysis of Geometric and Topological Outliers in Magnetic Resonance Images Abstract?we present a novel system for the automated reconstruction of cortical surfaces from T1-weighted magnetic resonance images. At the core of our system is a unified Reeb analysis framework for the detection and removal of geometric and topological outliers…

  • Cost Optimization of Elasticity Cloud Resource Subscription Policy

    0 out of 5
    4,500

    Cost Optimization of Elasticity Cloud Resource Subscription Policy   Abstract? In cloud computing, resource subscription is an important procedure which enables customers to elastically subscribe to IT resources based on their service requirements. Resource subscription can be divided into two categories, namely long-term reservation and on-demand subscription. Although customers need to pay the upfront fee…

  • Credit card transaction fraud detection Markov model

    0 out of 5
    4,500

    Credit card transaction fraud detection Markov model   Abstract? The most accepted payment mode is credit card for both online and offline in today’s world, it provides cashless shopping at every shop in all countries. It will be the most convenient way to do online shopping, paying bills etc. < Final Year Projects >Hence, risks…

  • Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks.

    0 out of 5
    4,500

    Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks.Wireless mesh networks (WMNs) have emerged as a flexible and low-cost network infrastructure, where heterogeneous mesh routers managed by different users collaborate to extend network coverage. This paper proposes a novel routing metric, Expected Forwarded Counter (EFW), and two further variants, to cope with the problem of…

  • Customized Policies for Handling Partial Information in Relational Databases

    0 out of 5
    4,500

    Customized Policies for Handling Partial Information in Relational Databases Abstract?Most real-world databases have at least some missing data. Today, users of such databases are ?on their own? in terms of how they manage this incompleteness. In this paper, we propose the general concept of partial information policy (PIP) operator to handle incompleteness in relational databases.<...

  • Data Mining for Xml Query-Answering Support

    0 out of 5
    4,500

    Data Mining for Xml Query-Answering Support Abstract? Extracting information from semistructured documents is a very hard task, and is going to become more and more critical as the amount of digital information available on the Internet grows. Indeed, documents are often so large that the data set returned as answer to a query may be…

End of content

End of content