Showing 205–216 of 2138 results

  • Placeholder

    A Secured Authentication System for MANETs using voice and Fingerprint Biometrics

    0 out of 5
    4,500

    A Secured Authentication System for MANETs using voice and Fingerprint Biometrics Abstract?Mobile Adhoc NETworks (MANET) are collections of wireless mobile devices with restricted broadcast range and resources and communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. MANET is a self configuring, dynamic, multi…

  • Placeholder

    A Secured Biometric Protocol Using IRIS codes

    0 out of 5
    4,500

    A Secured Biometric Protocol Using IRIS codes Abstract? A Secured Biometric Protocol Using IRIS codes Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference…

  • A Security Modeling Approach forWeb-Service-based Business Processes

    0 out of 5
    4,500

    A Security Modeling Approach forWeb-Service-based Business Processes. Several reports indicate that the highest business priorities include: business improvement, security, and IT management. The importance of security and risk management is gaining that even government statements in some cases have imposed the inclusion of security and risk management within business management. Risk assessment has become an…

  • Placeholder

    A Segmentation and Graph-based Sequence Matching Method for Video Copy Detection

    0 out of 5
    4,500

    A Segmentation and Graph-based Sequence Matching Method for Video Copy Detection Abstract? We propose in this paper a segmentation and graph-based video sequence matching method for video copy detection. Specifically, due to the good stability and discriminative ability of local features, we use SIFT descriptor for video content description. However, matching based on SIFT descriptor…

  • A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection

    0 out of 5
    4,500

    A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection Abstract? A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection. Some authors have approached the instance selection problem from a meta-learning perspective. In their work, they try to ?nd relationships between the performance of some methods from this ?eld and…

  • Placeholder

    A SIFT-based forensic method for copy-move attack detection and transformation recovery

    0 out of 5
    4,500

    A SIFT-based forensic method for copy-move attack detection and transformation recovery Abstract?One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law.< Final Year...

  • Placeholder

    A Similarity Measure for Text Classification and Clustering

    0 out of 5
    4,500

    A Similarity Measure for Text Classification and Clustering Abstract?A Similarity Measure for Text Classification and Clustering. Measuring the similarity between documents is an important operation in the text processing field. In this paper, a new similarity measure is proposed. To compute the similarity between two documents with respect to a feature, < Final Year Projects...

  • A Similarity-Based Learning Algorithm Using Distance Transformation

    0 out of 5
    4,500

    A Similarity-Based Learning Algorithm Using Distance Transformation Abstract? Numerous theories and algorithms have been developed to solve vectorial data learning problems by searching for the hypothesis that best ?ts the observed training sample. However, many real-world applications involve samples that are not described as feature vectors, but as (dis)similarity data. Converting vectorial data into <...

  • A Single-Ended With Dynamic Feedback Control 8T Subthreshold SRAM Cell

    0 out of 5
    5,500

    A Single-Ended With Dynamic Feedback Control 8T Subthreshold SRAM Cell Abstract?A novel 8-transistor (8T) static random access memory cell with improved data stability in subthreshold operation is designed. The proposed single-ended with dynamic feedback control 8T static RAM (SRAM) cell enhances the static noise margin (SNM) for ultralow power supply. < final year projects >…

  • Placeholder

    A Space-Bounded Anytime Algorithm for the Multiple Longest Common Subsequence Problem

    0 out of 5
    4,500

    A Space-Bounded Anytime Algorithm for the Multiple Longest Common Subsequence Problem Abstract?A Space-Bounded Anytime Algorithm for the Multiple Longest Common Subsequence Problem. The multiple longest common subsequence (MLCS) problem, related to the identification of sequence similarity, is an important problem in many fields. As an NP-hard problem, its exact algorithms have difficulty in handling large-scale…

  • A Spectrum Switching Delay-Aware Scheduling Algorithm for Centralized Cognitive Radio Networks

    0 out of 5
    4,500

    A Spectrum Switching Delay-Aware Scheduling Algorithm for Centralized Cognitive Radio Networks Abstract– A Spectrum Switching Delay-Aware Scheduling Algorithm for Centralized Cognitive Radio Networks. We formulate a scheduling problem that takes into account different hardware delays experienced by the secondary users (SUs) in a centralized cognitive radio network (CRN) while switching to different frequency bands. We…

  • Placeholder

    A Speed-Up Scheme Based on Multiple-Instance Pruning for Pedestrian Detection Using a Support Vector Machine

    0 out of 5
    4,500

    A Speed-Up Scheme Based on Multiple-Instance Pruning for Pedestrian Detection Using a Support Vector Machine Abstract?A Speed-Up Scheme Based on Multiple-Instance Pruning for Pedestrian Detection Using a Support Vector Machine. In pedestrian detection, as sophisticated feature descriptors are used for improving detection accuracy, its processing speed becomes a critical issue. In this paper, we propose…

End of content

End of content