Showing 1765–1776 of 2067 results

  • Security system based on Viola Jones Detection

    Security system based on Viola Jones Detection

    0 out of 5
    4,500

    Security system based on Viola Jones Detection   Abstract? ris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the irisemployed in automated border crossings, nationalID systems,etc.< Final Year Projects >This paper illustrates techniquesto improve performance of iris recognition system based onstationary images using NI LabVIEW(Vision…

  • SeDas: A Self-Destructing Data System Based on Active Storage Framework

    SeDas: A Self-Destructing Data System Based on Active Storage Framework

    0 out of 5
    4,500

    SeDas: A Self-Destructing Data System Based on Active Storage Framework Abstract? SeDas: A Self-Destructing Data System Based on Active Storage Framework. Personal data stored in the Cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data…

  • SeDaSC: Secure Data Sharing in Clouds

    SeDaSC: Secure Data Sharing in Clouds

    0 out of 5
    4,500

    SeDaSC: Secure Data Sharing in Clouds Abstract? SeDaSC: Secure Data Sharing in Clouds. Cloud storage is an application of clouds that liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. In case of group-shared data, the data face both cloud-specific and conventional insider threats. Secure data sharing among…

  • SeDaSC: Secure Data Sharing in Clouds

    SeDaSC: Secure Data Sharing in Clouds

    0 out of 5
    4,500

    SeDaSC: Secure Data Sharing in Clouds Abstract? SeDaSC: Secure Data Sharing in Clouds. Cloud storage is an application of clouds that liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. In case of group-shared data, the data face both cloud-speci?c and < Final Year Project 2016 > conventional…

  • Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud

    Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud

    0 out of 5
    4,500

    Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud. In cloud computing, data generated in electronic form are large in amount. To maintain this data efficiently, there is a necessity of data recovery services. To cater this, in this paper we propose a smart remote data backup algorithm, Seed Block Algorithm (SBA). The…

  • Segmentation of Intracranial Vessels and Aneurysmsin Phase Contrast Magnetic Resonance Angiography Using Multirange Filters and Local Variances

    Segmentation of Intracranial Vessels and Aneurysmsin Phase Contrast Magnetic Resonance Angiography Using Multirange Filters and Local Variances

    0 out of 5
    4,500

    Segmentation of Intracranial Vessels and Aneurysmsin Phase Contrast Magnetic Resonance Angiography Using Multirange Filters and Local Variances   Abstract? Segmentation of intensity varying and low-contrast structures is an extremely challenging and rewarding task. In computer-aided diagnosis of intracranial aneurysms, segmenting the high-intensity major vessels along with the attached low-contrast aneurysms is essential to the recognition…

  • Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks

    Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks

    0 out of 5
    4,500

    Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks Abstract? Segmentation of Tumor and Edema Along With Healthy Tissues of Brain Using Wavelets and Neural Networks. Robust brain magnetic resonance (MR) segmentation algorithms are critical to analyze tissues and diagnose tumor and edema in a quantitative way. In…

  • Segmentation of Underwater Images Using Different Techniques

    Segmentation of Underwater Images Using Different Techniques

    0 out of 5
    4,500

    Segmentation of Underwater Images Using Different Techniques Abstract? Segmentation of Underwater Images Using Different Techniques. This paper presents a method for the automatic creation of 2D mosaics of the sea floor, using video sequences acquired at different altitudes above the sea floor. The benefit of using different altitude sequences comes from the fact that higher…

  • Segmentation-Based Image Copy-Move Forgery Detection Scheme

    Segmentation-Based Image Copy-Move Forgery Detection Scheme

    0 out of 5
    4,500

    Segmentation-Based Image Copy-Move Forgery Detection Scheme Abstract? Segmentation-Based Image Copy-Move Forgery Detection Scheme. A scheme to detect the copy-move forgery in an image, mainly by extracting the keypoints for comparison. The main difference to the traditional methods is that the proposed scheme first segments the test image into semantically independent patches prior to < Final…

  • SeLeCT: Self-Learning Classifier for Internet Traffic

    SeLeCT: Self-Learning Classifier for Internet Traffic

    0 out of 5
    4,500

    SeLeCT: Self-Learning Classifier for Internet Traffic Abstract?Network visibility is a critical part of traffic engineering, network management, and security. The most popular current solutions – Deep Packet Inspection (DPI) and statistical classification, deeply rely on the availability of a training set. Besides the cumbersome need to regularly update the signatures, their visibility is limited to…

  • Selected Vehicle Tracking

    Selected Vehicle Tracking

    0 out of 5
    4,500

    Selected Vehicle Tracking Abstract?Selected Vehicle Tracking, Proportional Integral Derivative (PID) controller is a conventional controller, which is widely used in industrial control system. In this paper, a PID control system is used for path tracking of an autonomous surface vehicle (ASV). The PID controller is selected because it is easy to implement as an embedded…

  • Self-Adaptive Learning PSO-Based Deadline

    Self-Adaptive Learning PSO-Based Deadline

    0 out of 5
    4,500

    Self-Adaptive Learning PSO-Based Deadline Abstract?Public clouds provide Infrastructure as a Service (IaaS) to users who do not own sufficient compute resources. IaaS achieves the economy of scale by multiplexing, and therefore faces the challenge of scheduling tasks to meet the peak demand while preserving Quality-of-Service (QoS). Previous studies proposed proactive machine purchasing or cloud federation…

End of content

End of content