Contextual Hashing for Large-Scale Image Search Abstract?Contextual Hashing for Large-Scale Image Search. With the explosive growth of the multimedia data on the Web, content-based image search has attracted considerable attentions in the multimedia and the computer vision community. The most popular approach is based on the bag-of-visual-words model with invariant local features. Since the…
Continuous authentication, using behavioral biometrics, with keystroke and mouse Abstract? CA continuous behaviometric authentication system is tested on 99 users over 10 weeks, focusing on keystroke dynamics, mouse movements, application usage, and the system footprint.< Final Year Project > In the process, a new trust model was created to enable continuous evaluation of the…
Contour Model-Based Hand-Gesture Recognition Using the Kinect Sensor Abstract? Contour Model-Based Hand-Gesture Recognition Using the Kinect Sensor. In RGB-D sensor-based pose estimation, training data collection is often a challenging task. We propose a new hand motion capture procedure for establishing the real gesture data set. A 14-patch hand partition scheme is designed for color-based <…
Contrast Enhancement by Nonlinear Diffusion Filtering Abstract? Contrast Enhancement by Nonlinear Diffusion Filtering. To enhance the visual quality of an image that is degraded by uneven light, an effective method is to estimate the illumination component and compress it. Some previous methods have either defects of halo artifacts or contrast loss in the < Final…
Control and Experiment of an H-Bridge-Based Three-Phase Three-Stage Modular Power Electronic Transformer Abstract? Control and Experiment of an H-Bridge-Based Three-Phase Three-Stage Modular Power Electronic Transformer. Compared with conventional power transformer, the power electronic transformer PET < Final Year Projects 2016 > or solid-state transformer has many attractive additional features. An H-bridge-based three-phase three-stage modular PET,…
Control Cloud Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption Abstract?Control Cloud Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from…
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption Abstract? Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns…
Cooperating Virtual Memory and Write Buffer Management for Flash-Based Storage Systems Abstract-Cooperating Virtual Memory and Write Buffer Management for Flash-Based Storage Systems. Flash memory is becoming the preferred choice of secondary storage in mobile devices and embedded systems. The performance of Flash memory is dictated by asymmetric speeds of read and write, limited number of…
Cooperative Energy-Efficient Management of Federated WiFi Networks Abstract?Cooperative Energy-Efficient Management of Federated WiFi Networks. The proliferation of overlapping,always-on IEEE 802.11 access points < Final Year Projects 2016 > APs in urban areas, can cause inefficient bandwidth usage and energy waste. Cooperation among APs could address these problems by allowing underused devices to hand over their…
Coordinated and Adaptive Information Collecting in Target Tracking Wireless Sensor Networks Abstract?Coordinated and Adaptive Information Collecting in Target Tracking Wireless Sensor Networks. Energy conservation has been known as the most important issue for many applications in wireless sensor networks (WSNs). For data gathering in a clustered sensor network, most existing work focuses on fusing data…
Coordinated Control of a DG and Voltage Control Devices Using a Dynamic Programming Algorithm Abstract?A new control method, in which a distributed generator (DG) actively participates in steady-state voltage control, together with an under-load tap changer (ULTC) and shunt capacitors (Sh.Cs). In the conventional DG control method, the integration of DGs into a distribution…