Showing 1717–1728 of 2067 results

  • Scanned Image descreening with image redundancy and adaptive filtering

    Scanned Image descreening with image redundancy and adaptive filtering

    0 out of 5
    4,500

    Scanned Image descreening with image redundancy and adaptive filtering Abstract?Scanned Image descreening with image redundancy and adaptive filtering. Currently, most electrophotographic printers use halftoning technique to print continuous tone images, so scanned images obtained from such hard copies are usually corrupted by screen like artifacts. In this paper, a new model of scanned halftone image…

  • Scene Text Detection via Connected Component Clustering and Nontext Filtering

    Scene Text Detection via Connected Component Clustering and Nontext Filtering

    0 out of 5
    4,500

    Scene Text Detection via Connected Component Clustering and Nontext Filtering Abstract? we present a new scene text detection algorithm based on two machine learning classifiers: one allows us to generate candidate word regions and the other filters out nontext ones. To be precise, we extract connected components (CCs) in images by using the maximally stable…

  • Screen capture utility

    Screen capture utility

    0 out of 5
    4,500

    Screen capture utility   Abstract? Screen capture utility Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On Demand * Remote Connectivity *…

  • Search Engine

    Search Engine

    0 out of 5
    3,500

    Search Engine Abstract? Search Engine Web search engine provides information for the submitted query of the users, without consideration of user’s interests. Personalized Web search is used to consider the user interests for providing the results. Existing research Link-click-concept based ranking (LC2R) algorithm is suggested that extracts a user’s conceptual preferences from users’ click through…

  • Search Engine For Alumni

    Search Engine For Alumni

    0 out of 5
    3,500

    Search Engine For Alumni Abstract?Search Engine For Alumni. An undergraduate program must prepare its students for the major needs of the labor market. One of the main ways to identify what are the demands to be met is creating a manner to manage information of its alumni. This consists of gathering data from program’s alumni…

  • SecRBAC: Secure data in the Clouds

    SecRBAC: Secure data in the Clouds

    0 out of 5
    5,500

    SecRBAC: Secure data in the Clouds Abstract?Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loos of control over their data and raises reasonable security concerns that slow down the adoption…

  • Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs

    Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs

    0 out of 5
    4,500

    Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs Abstract? Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs. Cooperative wireless networking, which is promising in improving the system operation efficiency and reliability by acquiring more accurate and timely information, has attracted considerable attentions to support many services in practice. However, the problem…

  • Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

    Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

    0 out of 5
    4,500

    Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks Abstract? Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks. A data discovery and dissemination protocol for wireless sensor networks < Final Year Projects 2016 > is responsible for updating con?guration parameters of, and distributing management commands to, the sensor nodes. All…

  • Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

    Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

    0 out of 5
    4,500

    Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks Abstract? A data discovery and dissemination protocol for wireless sensor networks WSNs < Final Year Projects 2016 > is responsible for updating con?guration parameters of, and distributing management commands to, the sensor nodes. All existing data discovery and dissemination protocols suffer from two drawbacks….

  • Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

    Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

    0 out of 5
    4,500

    Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks Abstract?Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks. Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission…

  • Secure Anonymous Key Distribution Scheme for Smart Grid

    Secure Anonymous Key Distribution Scheme for Smart Grid

    0 out of 5
    4,500

    Secure Anonymous Key Distribution Scheme for Smart Grid Abstract? Secure Anonymous Key Distribution Scheme for Smart Grid. To fully support information management among various < Final Year Projects 2016 > stakeholders in smart grid domains, how to establish secure communication sessions has become an important issue for smart grid environments. In order to support secure…

  • Secure Audit Service by Using TPA for Data  Integrity in Cloud System

    Secure Audit Service by Using TPA for Data Integrity in Cloud System

    0 out of 5
    4,500

    Secure Audit Service by Using TPA for Data Integrity in Cloud System Abstract? Secure Audit Service by Using TPA for Data Integrity in Cloud System. Cloud computing is the vast computing utility, where users can remotely store their data into the cloud so to have the benefit of the on-demand < Final Year Projects 2016…

End of content

End of content