Showing 517–528 of 1966 results

  • Comparable Entity Mining from Comparative Questions

    0 out of 5
    4,500

    Comparable Entity Mining from Comparative Questions Abstract?Comparable Entity Mining from Comparative Questions. Comparing one thing with another is a typical part of human decision < Final Year Projects > making process. However, it is not always easy to know what to compare and what are the alternatives. In this paper, we present a novel way…

  • Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion

    0 out of 5
    4,500

    Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion Abstract?Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion. In this paper, we present a multimodal personal identification system using finger vein and finger dorsal images with their fusion applied at the feature level….

  • Comparative Document Summarization via Discriminative Sentence Selection

    0 out of 5
    4,500

    Comparative Document Summarization via Discriminative Sentence Selection Abstract?Cross-language multidocument summarization is the task to generate a summary in a target language (e.g., Chinese) from a collection of documents in a different source language (e.g., English). Previous methods such as the extractive and compressive algorithms focus only on single sentence selection and compression, which cannot make…

  • Comparative Study of Trust Modeling for Automatic Landmark Tagging

    0 out of 5
    4,500

    Comparative Study of Trust Modeling for Automatic Landmark Tagging Abstract? Comparative Study of Trust Modeling for Automatic Landmark Tagging. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=”…

  • Comparing business performance of banks

    0 out of 5
    3,500

    Comparing business performance of banks Abstract? Comparing business performance of banks. A direct evaporation ice-on-coil thermal storage experimental equipment was designed with the copper tube of diameter 16 mm and wall thickness 1 mm. The direct evaporation ice-on-coil can be arrayed at 100 × 100 mm (system A), 100 × 50 mm (system B) or…

  • Comparing business performance of mutual funds

    0 out of 5
    3,500

    Comparing business performance of mutual funds Abstract? Comparing business performance of mutual funds. There are many Mutual Funds rating companies in the market. Rating companies have different standards to evaluate Mutual Funds such as risks, incomes and some referable indexes. The study is aim at setting a score criterion to discuss the performance of equity…

  • Comparison and evaluation of data mining techniques with algorithmic models in software cost estimation

    0 out of 5
    4,500

    Comparison and evaluation of data mining techniques with algorithmic models in software cost estimation Abstract?Software Cost Estimation (SCE) is one of important topics in producing software in recent decades. Real estimation requires cost and effort factors in producing software by using of algorithmic or Artificial Intelligent (AI) techniques. Boehm developed the Constructive Cost Model (COCOMO)…

  • Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users

    0 out of 5
    4,500

    Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users Abstract? Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users. When a single < Final Year Projects 2016 > Cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of Cloud services is…

  • Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users

    0 out of 5
    4,500

    Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users Abstract?Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users. When a single Cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of Cloud services is required. < Final Year Projects > Cloud service composition,…

  • Compiler-Assisted Leakage- and Temperature- Aware Instruction-Level VLIW Scheduling

    0 out of 5
    4,500

    Compiler-Assisted Leakage- and Temperature- Aware Instruction-Level VLIW Scheduling Abstract?With technology scaled to nanometer-scale, leakage energy consumption is accounting for a greater proportion than ever, especially for very long instruction word (VLIW) architectures with a large number of functional units (FUs). The growing energy consumption leads to an increase in chip temperature, which again brings an…

  • Complex SAR Image Compression Based on Directional Lifting Wavelet Transform With High Clustering Capability

    0 out of 5
    4,500

    Complex SAR Image Compression Based on Directional Lifting Wavelet Transform With High Clustering Capability   Abstract? Complex SAR Image Compression Based on Directional Lifting Wavelet Transform With High Clustering Capability. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme…

  • Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys

    0 out of 5
    4,500

    Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing Abstract?Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing. We motivate and present two designs for the composition of the authentication protocol, Kerberos, and the key transport protocol, Multimedia Internet KEYing (MIKEY) for authenticated transport of…

End of content

End of content