Showing 553–564 of 1966 results

  • Contextual Hashing for Large-Scale Image Search

    0 out of 5
    4,500

    Contextual Hashing for Large-Scale Image Search   Abstract?Contextual Hashing for Large-Scale Image Search. With the explosive growth of the multimedia data on the Web, content-based image search has attracted considerable attentions in the multimedia and the computer vision community. The most popular approach is based on the bag-of-visual-words model with invariant local features. Since the…

  • Continuous authentication, using behavioral biometrics, with keystroke and mouse

    0 out of 5
    4,500

    Continuous authentication, using behavioral biometrics, with keystroke and mouse   Abstract? CA continuous behaviometric authentication system is tested on 99 users over 10 weeks, focusing on keystroke dynamics, mouse movements, application usage, and the system footprint.< Final Year Project > In the process, a new trust model was created to enable continuous evaluation of the…

  • Contour Model-Based Hand-Gesture Recognition Using the Kinect Sensor

    0 out of 5
    4,500

    Contour Model-Based Hand-Gesture Recognition Using the Kinect Sensor Abstract? Contour Model-Based Hand-Gesture Recognition Using the Kinect Sensor. In RGB-D sensor-based pose estimation, training data collection is often a challenging task. We propose a new hand motion capture procedure for establishing the real gesture data set. A 14-patch hand partition scheme is designed for color-based <…

  • Contrast Enhancement by Nonlinear Diffusion Filtering

    0 out of 5
    4,500

    Contrast Enhancement by Nonlinear Diffusion Filtering Abstract? Contrast Enhancement by Nonlinear Diffusion Filtering. To enhance the visual quality of an image that is degraded by uneven light, an effective method is to estimate the illumination component and compress it. Some previous methods have either defects of halo artifacts or contrast loss in the < Final…

  • Control and Experiment of an H-Bridge-Based Three-Phase Three-Stage Modular Power Electronic Transformer

    0 out of 5
    4,500

    Control and Experiment of an H-Bridge-Based Three-Phase Three-Stage Modular Power Electronic Transformer Abstract? Control and Experiment of an H-Bridge-Based Three-Phase Three-Stage Modular Power Electronic Transformer. Compared with conventional power transformer, the power electronic transformer PET < Final Year Projects 2016 > or solid-state transformer has many attractive additional features. An H-bridge-based three-phase three-stage modular PET,…

  • Control Cloud Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption

    0 out of 5
    4,500

    Control Cloud Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption Abstract?Control Cloud Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from…

  • Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption

    0 out of 5
    4,500

    Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption Abstract? Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns…

  • Control strategy of a cross-phase-connected unified power quality conditioner

    0 out of 5
    4,500

    Control strategy of a cross-phase-connected unified power quality conditioner Abstract?Control strategy of a cross-phase-connected unified power quality conditioner Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…

  • Cooperating Virtual Memory and Write Buffer Management for Flash-Based Storage Systems

    0 out of 5
    4,500

    Cooperating Virtual Memory and Write Buffer Management for Flash-Based Storage Systems Abstract-Cooperating Virtual Memory and Write Buffer Management for Flash-Based Storage Systems. Flash memory is becoming the preferred choice of secondary storage in mobile devices and embedded systems. The performance of Flash memory is dictated by asymmetric speeds of read and write, limited number of…

  • Cooperative Energy-Efficient Management of Federated WiFi Networks

    0 out of 5
    4,500

    Cooperative Energy-Efficient Management of Federated WiFi Networks Abstract?Cooperative Energy-Efficient Management of Federated WiFi Networks. The proliferation of overlapping,always-on IEEE 802.11 access points < Final Year Projects 2016 > APs in urban areas, can cause inefficient bandwidth usage and energy waste. Cooperation among APs could address these problems by allowing underused devices to hand over their…

  • Coordinated and Adaptive Information Collecting in Target Tracking Wireless Sensor Networks

    0 out of 5
    4,500

    Coordinated and Adaptive Information Collecting in Target Tracking Wireless Sensor Networks Abstract?Coordinated and Adaptive Information Collecting in Target Tracking Wireless Sensor Networks. Energy conservation has been known as the most important issue for many applications in wireless sensor networks (WSNs). For data gathering in a clustered sensor network, most existing work focuses on fusing data…

  • Coordinated Control of a DG and Voltage Control Devices Using a Dynamic Programming Algorithm

    0 out of 5
    4,500

    Coordinated Control of a DG and Voltage Control Devices Using a Dynamic Programming Algorithm   Abstract?A new control method, in which a distributed generator (DG) actively participates in steady-state voltage control, together with an under-load tap changer (ULTC) and shunt capacitors (Sh.Cs). In the conventional DG control method, the integration of DGs into a distribution…

End of content

End of content