Showing 2809–2820 of 3871 results

  • Personal health indexing based on medical examinations: A data mining approach

    Personal health indexing based on medical examinations: A data mining approach

    0 out of 5
    5,500

    Personal health indexing based on medical examinations: A data mining approach Abstract-We design a method called MyPHI that predicts personal health index (PHI), a new evidence-based health indicator to explore the underlying patterns of a large collection of geriatric medical examination (GME) records using data mining techniques. We de fine PHI as a vector of…

  • Personal Identification Using Minor Knuckle Patterns From Palm Dorsal Surface

    Personal Identification Using Minor Knuckle Patterns From Palm Dorsal Surface

    0 out of 5
    5,500

    Personal Identification Using Minor Knuckle Patterns From Palm Dorsal Surface Abstract?Finger or palm dorsal surface is inherently revealed while presenting (slap) fingerprints during border crossings or during day-to-day activities, such as driving, holding arms, signing documents, or playing sports. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation…

  • Personalized Influential Topic Search via Social Network Summarization

    Personalized Influential Topic Search via Social Network Summarization

    0 out of 5
    5,500

    Personalized Influential Topic Search via Social Network Summarization Abstract?Social networks are a vital mechanism to disseminate information to friends and colleagues. In this work, we investigate an important problem – the personalized influential topic search, or PIT-Search in a social network: Given a keyword query qissued by a useruin a social network, a PIT-Search is…

  • Personalized QoS-Aware Web Service Recommendation and Visualization

    Personalized QoS-Aware Web Service Recommendation and Visualization

    0 out of 5
    4,500

    Personalized QoS-Aware Web Service Recommendation and Visualization Abstract? With the proliferation of web services, effective QoS-based approach to service recommendation is becoming more and more important. Although service recommendation has been studied in the recent literature, the performance of existing ones is not satisfactory, since (1) previous approaches fail to consider the QoS variance according…

  • Java Projects—Data Mining

    Personalized Recommendation Combining User Interest and Social Circle

    0 out of 5
    4,500

    Personalized Recommendation Combining User Interest and Social Circle Abstract?Personalized Recommendation Combining User Interest and Social Circle. With the advent and popularity of social network, more and more users like to < Final Year Projects > share their experiences, such as ratings, reviews, and blogs. The new factors of social network like interpersonal influence and interest…

  • Java Projects—Data Mining

    Personalized Web Search Using WebClickSVD

    0 out of 5
    4,500

    Personalized Web Search Using WebClickSVD Abstract? Personalized Web Search Using WebClickSVD.This paper is focused on computing importance of a web page in an efficient way. Web page ranking is an essential factor in web search. Many modules and algorithms have been proposed using different resources with different assumptions. The algorithms proposed include Page Rank, Browse…

  • Phase-Shift Full Bridge Converter Project for A Dual Output DC-DC Converter

    Phase-Shift Full Bridge Converter Project for A Dual Output DC-DC Converter

    0 out of 5
    4,500

    Hybrid Modulation of Parallel-Series LLC Resonant Converter and Phase-Shift Full Bridge Converter for A Dual Output DC-DC Converter Abstract-A novel pulse frequency and phase shift hybrid modulated dual output DC-DC converter is proposed in this paper. The proposed converter is composed of hybrid modulation of an input-parallel-output-series LLC resonant converter and a phase-shift full bridge…

  • Phase-Shift-Controlled Isolated Buck-Boost Converter With Active-Clamped Three-Level Rectifier (AC-TLR) Featuring Soft-Switching Within Wide Operation Range

    Phase-Shift-Controlled Isolated Buck-Boost Converter With Active-Clamped Three-Level Rectifier (AC-TLR) Featuring Soft-Switching Within Wide Operation Range

    0 out of 5
    4,500

    Phase-Shift-Controlled Isolated Buck-Boost Converter With Active-Clamped Three-Level Rectifier (AC-TLR) Featuring Soft-Switching Within Wide Operation Range Abstract? Phase-Shift-Controlled Isolated Buck-Boost Converter With Active-Clamped Three-Level Rectifier (AC-TLR) Featuring Soft-Switching Within Wide Operation Range. An active-clamped three-level rectifier (AC-TLR) is derived from the diode-clamped three-level inverter, by replac-ing the active switches and the diodes in the three-level inverter…

  • PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in C loud

    PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in C loud

    0 out of 5
    5,500

    PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in C loud Abstract? Recently, many more enterprises have moved their data into the cloud by using file syncing and sharing (F SS) service, but bring-your-own-device (BYOD) policies and greatly increasing mobile devices have in fact raised a new challenge for preventing the player/decoder…

  • .NET Projects - data mining

    Phishing Detection System Using Machine Learning and Hadoop – MapReduce

    0 out of 5
    4,500

    Phishing Detection System Using Machine Learning and Hadoop-MapReduce Abstract? Detecting & Identifying phishy websites is a tedious slow < Final Year Projects 2016 > work. Several attributes are needed to be taken into consideration & finally using the data mining algorithms, a final decision is made. For finding these attribute we have used MapReduce algorithm…

  • .NET Projects - NetworkingDetecting Phishing With Streaming Analytics

    PhishStorm: Detecting Phishing With Streaming Analytics

    0 out of 5
    4,500

    PhishStorm: Detecting Phishing With Streaming Analytics Abstract? Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inef?cient due to the short lifetime of phishing Web sites, making recent approaches relying on real-time or proactive phishing URL detection…

  • Photo-to-Sketch Transformation in a Complex Background

    Photo-to-Sketch Transformation in a Complex Background

    0 out of 5
    4,500

    Photo-to-Sketch Transformation in a Complex Background Abstract-In the first place, investigate the problem of sketch generation for sketch-based image retrieval (SBIR).Solving this problem is important to obtain better retrieval results, because a powerful feature extraction algorithm is inefficient. Transforming photos from raw pixels into pseudo-sketches closes the gap between these two domains and plays a…

End of content

End of content