Showing 577–588 of 1966 results

  • Counting crowd flow based on feature points

    0 out of 5
    4,500

    Counting crowd flow based on feature points Abstract? Counting crowd flow based on feature points. A counting approach for crowd flow based on feature points is proposed. The objective is to obtain the characteristics of the crowd flow in a scene, including the < Final Year Projects 2016 > crowd orientation and numeric count. For…

  • Course Assessment outcome Managing System

    0 out of 5
    3,500

    Course Assessment outcome Managing System Abstract? The Course Assessment Outcome System is a web based application system that provides the users to store and retrieves the Student Assessment Report details in an easy and efficient way. Using this system, The Administration of the college can easily maintain and monitor their Students, Staff and every department…

  • CPCDN: Content Delivery Powered by Context and User Intelligence

    0 out of 5
    4,500

    CPCDN: Content Delivery Powered by Context and User Intelligence Abstract? CPCDN: Content Delivery Powered by Context and User Intelligence. An unprecedented trend that content providers < Final Year Projects 2016 > are building their own content delivery networks (CDNs) to provide a variety of content services to their users. By exploiting powerful CP-level information in…

  • Credit card Fraud Detecction In GSM using Cryptography

    0 out of 5
    3,500

    Credit card Fraud Detecction In GSM using Cryptography Abstract? Credit card Fraud Detecction In GSM using Cryptography. This study proposes an online fraud-resistant technology for credit card e-transactions, which provides three characteristics: cardholder-driven identification, merchant-driven verification, < Final Year Projects > and issuer-driven authorization. This paper also presents the resistant capability of credit card frauds…

  • Credit Card Fraud Detection Using Neural Network

    0 out of 5
    4,500

    Credit Card Fraud Detection Using Neural Network Abstract?Credit Card Fraud Detection Using Neural Network. Due to the rapid progress of the e-commerce and online banking, use of credit cards has increased considerably leading to a large number of fraud incidents. In this paper, we have proposed a novel approach towards credit card fraud detection in…

  • Credit card transaction fraud detection Markov model

    0 out of 5
    4,500

    Credit card transaction fraud detection Markov model   Abstract? The most accepted payment mode is credit card for both online and offline in today’s world, it provides cashless shopping at every shop in all countries. It will be the most convenient way to do online shopping, paying bills etc. < Final Year Projects >Hence, risks…

  • Crime Automation & Reporting System

    0 out of 5
    4,500

    Crime Automation & Reporting System Abstract? Crime Automation & Reporting System. National surveys demonstrate that millions of crimes go Unreported. Several reasons may contribute to this lack of reporting. Also Crime reporting needs to be possible 24/7. Although several other options exist and there are most publicized reporting mechanisms. Internet-based crime reporting systems allow victims…

  • Critical-Path Analysis and Low-Complexity Implementation of the LMS Adaptive Algorithm

    0 out of 5
    4,500

    Critical-Path Analysis and Low-Complexity Implementation of the LMS Adaptive Algorithm Abstract?This paper presents a precise analysis of the critical path of the least-mean-square (LMS) adaptive filter for deriving its architectures for high-speed and low-complexity implementation. It is shown that the direct-form LMS adaptive filter has nearly the same critical path as its transpose-form counterpart, but…

  • CRoM and HuspExt: Improving Efficiency of High Utility Sequential Pattern Extraction

    0 out of 5
    4,500

    CRoM and HuspExt: Improving Efficiency of High Utility Sequential Pattern Extraction Abstract? CRoM and HuspExt: Improving Efficiency of High Utility Sequential Pattern Extraction. High utility sequential pattern mining has been considered as an important research problem and a number of relevant algorithms have been proposed for this topic. The main challenge of high utility sequential…

  • Cross-Domain Sentiment Classification Using a Sentiment Sensitive Thesaurus

    0 out of 5
    4,500

    Cross-Domain Sentiment Classification Using a Sentiment Sensitive Thesaurus Abstract? Cross-Domain Sentiment Classification Using a Sentiment Sensitive Thesaurus. Automatic classification of sentiment is important for numerous applications such as opinion mining, opinion summarization, contextual advertising, and market analysis. Typically, sentiment classification has been modeled as the problem of training a binary classifier using reviews annotated for…

  • Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks.

    0 out of 5
    4,500

    Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks.Wireless mesh networks (WMNs) have emerged as a flexible and low-cost network infrastructure, where heterogeneous mesh routers managed by different users collaborate to extend network coverage. This paper proposes a novel routing metric, Expected Forwarded Counter (EFW), and two further variants, to cope with the problem of…

  • CrowdOp: Query Optimization for Declarative Crowdsourcing Systems

    0 out of 5
    4,500

    CrowdOp: Query Optimization for Declarative Crowdsourcing Systems Abstract? CrowdOp: Query Optimization for Declarative Crowdsourcing Systems. We study the query optimization problem in declarative crowdsourcing systems. Declarative crowdsourcing is designed to hide the complexities and relieve the user the burden of dealing with the crowd. The user is only required to submitan SQL-like query and the…

End of content

End of content