Showing 589–600 of 2014 results

  • Context-based Collaborative Filtering for Citation Recommendation

    Context-based Collaborative Filtering for Citation Recommendation

    0 out of 5
    4,500

    Context-based Collaborative Filtering for Citation Recommendation Abstract? Citation recommendation is an interesting and significant research area as it solves information overload in academia by automatically suggesting relevant references for a research paper. Recently, with the rapid proliferation of information technology, research papers are rapidly published in various conferences and journals. This makes citation recommendation a…

  • Matlab_Dip

    Contextual Hashing for Large-Scale Image Search

    0 out of 5
    4,500

    Contextual Hashing for Large-Scale Image Search   Abstract?Contextual Hashing for Large-Scale Image Search. With the explosive growth of the multimedia data on the Web, content-based image search has attracted considerable attentions in the multimedia and the computer vision community. The most popular approach is based on the bag-of-visual-words model with invariant local features. Since the…

  • .NET Projects - data mining

    Continuous authentication, using behavioral biometrics, with keystroke and mouse

    0 out of 5
    4,500

    Continuous authentication, using behavioral biometrics, with keystroke and mouse   Abstract? CA continuous behaviometric authentication system is tested on 99 users over 10 weeks, focusing on keystroke dynamics, mouse movements, application usage, and the system footprint.< Final Year Project > In the process, a new trust model was created to enable continuous evaluation of the…

  • Contour Model-Based Hand-Gesture Recognition Using the Kinect Sensor

    Contour Model-Based Hand-Gesture Recognition Using the Kinect Sensor

    0 out of 5
    4,500

    Contour Model-Based Hand-Gesture Recognition Using the Kinect Sensor Abstract? Contour Model-Based Hand-Gesture Recognition Using the Kinect Sensor. In RGB-D sensor-based pose estimation, training data collection is often a challenging task. We propose a new hand motion capture procedure for establishing the real gesture data set. A 14-patch hand partition scheme is designed for color-based <…

  • Matlab_Dip

    Contrast Enhancement by Nonlinear Diffusion Filtering

    0 out of 5
    4,500

    Contrast Enhancement by Nonlinear Diffusion Filtering Abstract? Contrast Enhancement by Nonlinear Diffusion Filtering. To enhance the visual quality of an image that is degraded by uneven light, an effective method is to estimate the illumination component and compress it. Some previous methods have either defects of halo artifacts or contrast loss in the < Final…

  • Control and Experiment of an H-Bridge-Based Three-Phase Three-Stage Modular Power Electronic Transformer

    Control and Experiment of an H-Bridge-Based Three-Phase Three-Stage Modular Power Electronic Transformer

    0 out of 5
    4,500

    Control and Experiment of an H-Bridge-Based Three-Phase Three-Stage Modular Power Electronic Transformer Abstract? Control and Experiment of an H-Bridge-Based Three-Phase Three-Stage Modular Power Electronic Transformer. Compared with conventional power transformer, the power electronic transformer PET < Final Year Projects 2016 > or solid-state transformer has many attractive additional features. An H-bridge-based three-phase three-stage modular PET,…

  • Java Projects—Data Mining

    Control Cloud Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption

    0 out of 5
    4,500

    Control Cloud Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption Abstract?Control Cloud Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from…

  • Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption

    Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption

    0 out of 5
    4,500

    Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption Abstract? Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns…

  • Control strategy of a cross-phase-connected unified power quality conditioner

    Control strategy of a cross-phase-connected unified power quality conditioner

    0 out of 5
    4,500

    Control strategy of a cross-phase-connected unified power quality conditioner Abstract?Control strategy of a cross-phase-connected unified power quality conditioner Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…

  • Cooperating Virtual Memory and Write Buffer Management for Flash-Based Storage Systems

    Cooperating Virtual Memory and Write Buffer Management for Flash-Based Storage Systems

    0 out of 5
    4,500

    Cooperating Virtual Memory and Write Buffer Management for Flash-Based Storage Systems Abstract-Cooperating Virtual Memory and Write Buffer Management for Flash-Based Storage Systems. Flash memory is becoming the preferred choice of secondary storage in mobile devices and embedded systems. The performance of Flash memory is dictated by asymmetric speeds of read and write, limited number of…

  • Cooperative Energy-Efficient Management of Federated WiFi Networks

    Cooperative Energy-Efficient Management of Federated WiFi Networks

    0 out of 5
    4,500

    Cooperative Energy-Efficient Management of Federated WiFi Networks Abstract?Cooperative Energy-Efficient Management of Federated WiFi Networks. The proliferation of overlapping,always-on IEEE 802.11 access points < Final Year Projects 2016 > APs in urban areas, can cause inefficient bandwidth usage and energy waste. Cooperation among APs could address these problems by allowing underused devices to hand over their…

  • Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks

    Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks

    0 out of 5
    4,500

    Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks Abstract? Mobile ad hoc networks (MANETs) are becoming increasingly common, and typical network loads considered for MANETs are increasing as applications evolve. This, in turn, increases the importance of bandwidth efficiency while maintaining tight requirements on energy consumption, delay and jitter. Coordinated…

End of content

End of content