Showing 1669–1680 of 2014 results

  • Scalable Recommendation with Social Contextual Information

    Scalable Recommendation with Social Contextual Information

    0 out of 5
    4,500

    Scalable Recommendation with Social Contextual Information Abstract?Scalable Recommendation with Social Contextual Information. Exponential growth of information generated by online social networks demands effective and scalable recommender systems to give useful results. Traditional techniques become unqualified because they ignore social relation data; existing social recommendation approaches consider social network structure, but social contextual information has not…

  • Scalable secure sharing Personal Health Record in cloud(JSP)

    Scalable secure sharing Personal Health Record in cloud(JSP)

    0 out of 5
    4,500

    Scalable secure sharing Personal Health Record in cloud(JSP)   Abstract?Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is often outsourced to be stored in a third-party server. In this paper we propose a novel secure and scalable system for sharing PHRs. We focus…

  • Scalable secure sharing Personal Health Record using Attribute Based Encryption

    Scalable secure sharing Personal Health Record using Attribute Based Encryption

    0 out of 5
    4,500

    Scalable secure sharing Personal Health Record using Attribute Based Encryption Abstract? Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those…

  • Scale invariant and deformation tolerant partial shape matching

    Scale invariant and deformation tolerant partial shape matching

    0 out of 5
    4,500

    Scale invariant and deformation tolerant partial shape matching   Abstract– Scale invariant and deformation tolerant partial shape matching. We propose a novel multi-scale shape descriptor for shape matching and object recognition. The descriptor includes three types of invariants in multiple scales to capture discriminative local and semi-global shape features and the dynamic programming algorithm is…

  • Scale-Free Hyperbolic CORDIC Processor and Its Application to Waveform Generation

    Scale-Free Hyperbolic CORDIC Processor and Its Application to Waveform Generation

    0 out of 5
    4,500

    Scale-Free Hyperbolic CORDIC Processor and Its Application to Waveform Generation Abstract? Scale-Free Hyperbolic CORDIC Processor and Its Application to Waveform Generation. This paper presents a novel completely scaling-free CORDIC algorithm in rotation mode for hyperbolic trajectory. We use most-significant-1 bit detection technique for micro-rotation sequence generation to reduce the number of iterations. By storing the…

  • Scan Test Bandwidth Management for Ultralarge-Scale System-on-Chip Architectures

    Scan Test Bandwidth Management for Ultralarge-Scale System-on-Chip Architectures

    0 out of 5
    4,500

    Scan Test Bandwidth Management for Ultralarge-Scale System-on-Chip Architectures Abstract? Scan Test Bandwidth Management for Ultralarge-Scale System-on-Chip Architectures. Presents several techniques employed to resolve problems surfacing when applying scan bandwidth management to large industrial multicore system-on-chip < Final Year Projects 2016 > SoC designs with embedded test data compression. These designs pose significant challenges to the…

  • Scanned Image descreening with image redundancy and adaptive filtering

    Scanned Image descreening with image redundancy and adaptive filtering

    0 out of 5
    4,500

    Scanned Image descreening with image redundancy and adaptive filtering Abstract?Scanned Image descreening with image redundancy and adaptive filtering. Currently, most electrophotographic printers use halftoning technique to print continuous tone images, so scanned images obtained from such hard copies are usually corrupted by screen like artifacts. In this paper, a new model of scanned halftone image…

  • Scene Text Detection via Connected Component Clustering and Nontext Filtering

    Scene Text Detection via Connected Component Clustering and Nontext Filtering

    0 out of 5
    4,500

    Scene Text Detection via Connected Component Clustering and Nontext Filtering Abstract? we present a new scene text detection algorithm based on two machine learning classifiers: one allows us to generate candidate word regions and the other filters out nontext ones. To be precise, we extract connected components (CCs) in images by using the maximally stable…

  • Screen capture utility

    Screen capture utility

    0 out of 5
    4,500

    Screen capture utility   Abstract? Screen capture utility Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On Demand * Remote Connectivity *…

  • Search Engine

    Search Engine

    0 out of 5
    3,500

    Search Engine Abstract? Search Engine Web search engine provides information for the submitted query of the users, without consideration of user’s interests. Personalized Web search is used to consider the user interests for providing the results. Existing research Link-click-concept based ranking (LC2R) algorithm is suggested that extracts a user’s conceptual preferences from users’ click through…

  • Search Engine For Alumni

    Search Engine For Alumni

    0 out of 5
    3,500

    Search Engine For Alumni Abstract?Search Engine For Alumni. An undergraduate program must prepare its students for the major needs of the labor market. One of the main ways to identify what are the demands to be met is creating a manner to manage information of its alumni. This consists of gathering data from program’s alumni…

  • SecRBAC: Secure data in the Clouds

    SecRBAC: Secure data in the Clouds

    0 out of 5
    5,500

    SecRBAC: Secure data in the Clouds Abstract?Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loos of control over their data and raises reasonable security concerns that slow down the adoption…

End of content

End of content