Showing 553–564 of 2014 results

  • Java Projects—Data Mining

    Comparable Entity Mining from Comparative Questions

    0 out of 5
    4,500

    Comparable Entity Mining from Comparative Questions Abstract?Comparable Entity Mining from Comparative Questions. Comparing one thing with another is a typical part of human decision < Final Year Projects > making process. However, it is not always easy to know what to compare and what are the alternatives. In this paper, we present a novel way…

  • Matlab_Dip

    Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion

    0 out of 5
    4,500

    Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion Abstract?Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion. In this paper, we present a multimodal personal identification system using finger vein and finger dorsal images with their fusion applied at the feature level….

  • Java Projects—Data Mining

    Comparative Document Summarization via Discriminative Sentence Selection

    0 out of 5
    4,500

    Comparative Document Summarization via Discriminative Sentence Selection Abstract?Cross-language multidocument summarization is the task to generate a summary in a target language (e.g., Chinese) from a collection of documents in a different source language (e.g., English). Previous methods such as the extractive and compressive algorithms focus only on single sentence selection and compression, which cannot make…

  • Comparing business performance of banks

    Comparing business performance of banks

    0 out of 5
    3,500

    Comparing business performance of banks Abstract? Comparing business performance of banks. A direct evaporation ice-on-coil thermal storage experimental equipment was designed with the copper tube of diameter 16 mm and wall thickness 1 mm. The direct evaporation ice-on-coil can be arrayed at 100 Ă— 100 mm (system A), 100 Ă— 50 mm (system B) or…

  • Dotnet Project

    Comparing business performance of mutual funds

    0 out of 5
    3,500

    Comparing business performance of mutual funds Abstract? Comparing business performance of mutual funds. There are many Mutual Funds rating companies in the market. Rating companies have different standards to evaluate Mutual Funds such as risks, incomes and some referable indexes. The study is aim at setting a score criterion to discuss the performance of equity…

  • Java Projects—Data Mining

    Comparison and evaluation of data mining techniques with algorithmic models in software cost estimation

    0 out of 5
    4,500

    Comparison and evaluation of data mining techniques with algorithmic models in software cost estimation Abstract?Software Cost Estimation (SCE) is one of important topics in producing software in recent decades. Real estimation requires cost and effort factors in producing software by using of algorithmic or Artificial Intelligent (AI) techniques. Boehm developed the Constructive Cost Model (COCOMO)…

  • Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users

    Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users

    0 out of 5
    4,500

    Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users Abstract? Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users. When a single < Final Year Projects 2016 > Cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of Cloud services is…

  • Java Projects — Cloud Computing

    Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users

    0 out of 5
    4,500

    Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users Abstract?Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users. When a single Cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of Cloud services is required. < Final Year Projects > Cloud service composition,…

  • Compiler-Assisted Leakage- and Temperature- Aware Instruction-Level VLIW Scheduling

    Compiler-Assisted Leakage- and Temperature- Aware Instruction-Level VLIW Scheduling

    0 out of 5
    4,500

    Compiler-Assisted Leakage- and Temperature- Aware Instruction-Level VLIW Scheduling Abstract?With technology scaled to nanometer-scale, leakage energy consumption is accounting for a greater proportion than ever, especially for very long instruction word (VLIW) architectures with a large number of functional units (FUs). The growing energy consumption leads to an increase in chip temperature, which again brings an…

  • .NET Projects - cloud Computing

    Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys

    0 out of 5
    4,500

    Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing Abstract?Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing. We motivate and present two designs for the composition of the authentication protocol, Kerberos, and the key transport protocol, Multimedia Internet KEYing (MIKEY) for authenticated transport of…

  • Compressed Fingerprint Matching and Camera Identification via Random Projections

    Compressed Fingerprint Matching and Camera Identification via Random Projections

    0 out of 5
    4,500

    Compressed Fingerprint Matching and Camera Identification via Random Projections Abstract?Compressed Fingerprint Matching and Camera Identification via Random Projections. Sensor imperfections in the form of photoresponse nonuniformity (PRNU) patterns are a well-established fingerprinting technique to link pictures to the camera sensors that acquired them. The noise-like characteristics of the < Final Year Projects 2016 > PRNU…

  • Compressing Encrypted Images with Auxiliary Information

    Compressing Encrypted Images with Auxiliary Information

    0 out of 5
    4,500

    Compressing Encrypted Images with Auxiliary Information Abstract? Compressing Encrypted Images with Auxiliary Information. Proposes a novel scheme of compressing encrypted images with auxiliary information. The content owner encrypts the original uncompressed < Final Year Projects 2016 > images and also generates some auxiliary information, which will be used for data compression and image reconstruction. Then,…

End of content

End of content