Showing 3313–3324 of 3871 results

  • Segmentation-Based Image Copy-Move Forgery Detection Scheme

    Segmentation-Based Image Copy-Move Forgery Detection Scheme

    0 out of 5
    4,500

    Segmentation-Based Image Copy-Move Forgery Detection Scheme Abstract? Segmentation-Based Image Copy-Move Forgery Detection Scheme. A scheme to detect the copy-move forgery in an image, mainly by extracting the keypoints for comparison. The main difference to the traditional methods is that the proposed scheme first segments the test image into semantically independent patches prior to < Final…

  • Segmenting Retinal Blood Vessels with Deep Neural Networks

    Segmenting Retinal Blood Vessels with Deep Neural Networks

    0 out of 5

    Segmenting Retinal Blood Vessels with Deep Neural Networks Abstract?The condition of the vascular network of human eye is an important diagnostic factor in ophthalmology. Its segmentation in fundus imaging is a nontrivial task due to variable size of vessels, relatively low contrast, and potential presence of pathologies like microaneurysms and hemorrhages.< final year projects >…

  • SeLeCT: Self-Learning Classifier for Internet Traffic

    SeLeCT: Self-Learning Classifier for Internet Traffic

    0 out of 5
    4,500

    SeLeCT: Self-Learning Classifier for Internet Traffic Abstract?Network visibility is a critical part of traffic engineering, network management, and security. The most popular current solutions – Deep Packet Inspection (DPI) and statistical classification, deeply rely on the availability of a training set. Besides the cumbersome need to regularly update the signatures, their visibility is limited to…

  • Selected Vehicle Tracking

    Selected Vehicle Tracking

    0 out of 5
    4,500

    Selected Vehicle Tracking Abstract?Selected Vehicle Tracking, Proportional Integral Derivative (PID) controller is a conventional controller, which is widely used in industrial control system. In this paper, a PID control system is used for path tracking of an autonomous surface vehicle (ASV). The PID controller is selected because it is easy to implement as an embedded…

  • Self Security Through GPS Based Protection System

    Self Security Through GPS Based Protection System

    0 out of 5
    6,500

    Self Security Through GPS Based Protection System Abstract? Self-security through GPS based protection system is a security application which is specially designed for mobile users especially for women. This application offers a helping hand with the help of GPS based location tracing. At the time of emergency there may not be any possibility to attempt…

  • Self-Adaptive Learning PSO-Based Deadline

    Self-Adaptive Learning PSO-Based Deadline

    0 out of 5
    4,500

    Self-Adaptive Learning PSO-Based Deadline Abstract?Public clouds provide Infrastructure as a Service (IaaS) to users who do not own sufficient compute resources. IaaS achieves the economy of scale by multiplexing, and therefore faces the challenge of scheduling tasks to meet the peak demand while preserving Quality-of-Service (QoS). Previous studies proposed proactive machine purchasing or cloud federation…

  • Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters

    Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters

    0 out of 5
    4,500

    Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters Abstract? Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters. The MapReduce framework and its open source implementation Hadoop have become the defacto platform for scalable analysis on large data sets in recent years. One of the primary concerns in Hadoop is how to minimize the…

  • Self-Deployment of Mobile Sensors to Achieve Target Coverage in the Presence of Obstacles

    Self-Deployment of Mobile Sensors to Achieve Target Coverage in the Presence of Obstacles

    0 out of 5
    5,500

    Self-Deployment of Mobile Sensors to Achieve Target Coverage in the Presence of Obstacles Abstract? Target coverage is one of the major requirements in wireless sensor network applications, the purpose of which is to monitor a set of known targets in the region of interest. In this paper, we propose a localized self-deployment scheme, named as…

  • Self-Deployment of Randomly Scattered Mobile Sensors to Achieve Barrier Coverage

    Self-Deployment of Randomly Scattered Mobile Sensors to Achieve Barrier Coverage

    0 out of 5
    5,500

    Self-Deployment of Randomly Scattered Mobile Sensors to Achieve Barrier Coverage Abstract? Constructing sensor barrier is a critical issue in wireless sensor networks for military and homeland security applications, which aims to detect intruders crossing into a protected area. In this letter, we propose two distributed, localized deployment schemes for self-adjustment of randomly deployed mobile sensor…

  • Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks

    Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks

    0 out of 5
    4,500

    Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks Abstract?Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…

  • Self-Supervised Online Metric Learning With Low Rank Constraint for Scene Categorization

    Self-Supervised Online Metric Learning With Low Rank Constraint for Scene Categorization

    0 out of 5
    4,500

    Self-Supervised Online Metric Learning With Low Rank Constraint for Scene Categorization   Abstract?Conventional visual recognition systems usually train an image classifier in a bath mode with all training data provided in advance. However, in many practical applications, only a small amount of training samples are available in the beginning and many more would come sequentially…

  • Semantic Features Selection and Representation for Facial Image Retrieval System

    Semantic Features Selection and Representation for Facial Image Retrieval System

    0 out of 5
    4,500

    Semantic Features Selection and Representation for Facial Image Retrieval System   Abstract? Most image retrieval methods are specialized for image based matching and retrieval based on low-level features. However, humans perceive facial images and compare their similarities using high-level features, such as the description and ranking of facial traits including gender, race, and age. In…

End of content

End of content