Showing 61–72 of 665 results

  • Placeholder

    A Research of Feature-based Image Mosaic Algorithm

    0 out of 5
    4,500

    A Research of Feature-based Image Mosaic Algorithm Abstract?Due to the stitching precision and speed of existing image mosaicing technique, this paper summarizes three common based on Feature matching algorithm: Harris corner detection algorithm, SIFT (Scale Invariant Feature Transform) algorithm, SURF ( Speeded-Up Robust Features ) algorithm. This paper describes the principle of three algorithm respectively….

  • A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments

    0 out of 5
    4,500

    A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments Abstract?Approximations of a concept by a variable precision rough-set model (VPRS) usually vary under a dynamic information system environment. It is thus effective to carry out incremental updating approximations by utilizing previous data structures.< Final Year Project > This paper focuses on a new…

  • A Scalable and Modular Architecture for High-Performance Packet Classification

    0 out of 5
    4,500

    A Scalable and Modular Architecture for High-Performance Packet Classification Abstract? A Scalable and Modular Architecture for High-Performance Packet Classification. Packet classification is widely used as a core function for various applications in network infrastructure. With increasing demands in throughput, performing wire-speed packet classification has become challenging. Also the performance of today’s packet classification solutions depends…

  • Placeholder

    A Scalable Server Architecture for Mobile Presence Services in Social Network Applications

    0 out of 5
    4,500

    A Scalable Server Architecture for Mobile Presence Services in Social Network Applications   Abstract? A Scalable Server Architecture for Mobile Presence Services in Social Network Applications. Social network applications are becoming increasingly popular on mobile devices. A mobile presence service is an essential component of a social network application because it maintains each mobile user’s…

  • A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization using MapReduce on Cloud

    0 out of 5
    4,500

    A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization using MapReduce on Cloud Abstract? A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization using MapReduce on Cloud. A large number of cloud services require users to share private data like electronic health records for data analysis or mining, bringing privacy concerns. Anonymizing data sets via…

  • Placeholder

    A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

    0 out of 5
    4,500

    A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability Abstract? A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An…

  • Placeholder

    A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

    0 out of 5
    4,500

    A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces…

  • A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation

    0 out of 5
    4,500

    A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Abstract? A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.a secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will…

  • Placeholder

    A Secured Authentication System for MANETs using voice and Fingerprint Biometrics

    0 out of 5
    4,500

    A Secured Authentication System for MANETs using voice and Fingerprint Biometrics Abstract?Mobile Adhoc NETworks (MANET) are collections of wireless mobile devices with restricted broadcast range and resources and communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. MANET is a self configuring, dynamic, multi…

  • Placeholder

    A Secured Biometric Protocol Using IRIS codes

    0 out of 5
    4,500

    A Secured Biometric Protocol Using IRIS codes Abstract? A Secured Biometric Protocol Using IRIS codes Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference…

  • A Security Modeling Approach forWeb-Service-based Business Processes

    0 out of 5
    4,500

    A Security Modeling Approach forWeb-Service-based Business Processes. Several reports indicate that the highest business priorities include: business improvement, security, and IT management. The importance of security and risk management is gaining that even government statements in some cases have imposed the inclusion of security and risk management within business management. Risk assessment has become an…

  • Placeholder

    A Segmentation and Graph-based Sequence Matching Method for Video Copy Detection

    0 out of 5
    4,500

    A Segmentation and Graph-based Sequence Matching Method for Video Copy Detection Abstract? We propose in this paper a segmentation and graph-based video sequence matching method for video copy detection. Specifically, due to the good stability and discriminative ability of local features, we use SIFT descriptor for video content description. However, matching based on SIFT descriptor…

End of content

End of content