A Region-Wised Medium Transmission Based Image Dehazing Method Abstract– Image dehazing is a technique to enhance the images acquired in poor weather conditions, such as fog and haze. Existing image dehazing methods are mainly based on dark channel prior. Since the dark channel is not reasonable for sky regions, a sky segmentation and region wised…
A Reliable Three-Phase Transformerless Grid-Connected PV Inverter With Inductive DC Link Abstract-In this paper, a modi?ed buck?boost grid-connected three-phase photovoltaic inverter is presented. In the structure of inverter, an inductive dc link is used between the input and output. The merits of the employed inverter are soft switching and step-up/down conversion without any additional power…
A Research of Feature-based Image Mosaic Algorithm Abstract?Due to the stitching precision and speed of existing image mosaicing technique, this paper summarizes three common based on Feature matching algorithm: Harris corner detection algorithm, SIFT (Scale Invariant Feature Transform) algorithm, SURF ( Speeded-Up Robust Features ) algorithm. This paper describes the principle of three algorithm…
A Resource Allocation Scheme for Multiple Device-to-Device Multicasts in Cellular Networks Abstract?Device-to-Device (D2D) multicast communication is emerging as a practical solution to alleviate severe capacity crunch in data-centric wireless networks. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution…
A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks Abstract?A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks. This paper proposes the first resource allocation scheme in the literature to support scalable-video multicast for WiMAX relay networks. We prove that when the < Final Year Projects > available bandwidth…
A Review of Anomaly based Intrusion Detection Systems Abstract? With the advent of anomaly-based intrusion detection systems, many approaches and techniques have been developed to track novel attacks on the systems. High detection rate of 98% at a low alarm rate of 1% can be achieved by using these techniques. Though anomaly-based approaches are efficient,…
A Review on Mining Students? Data for Performance Prediction Abstract? A country?s growth is strongly measured by the quality of its education system. Education sector has witnessed sea change in its functioning. Today it is recognized as an industry and as an industry it is facing challenges. The challenges of higher education being decrease in…
A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds Abstract?A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds.Cloud computing is emerging as a new computing paradigm in the healthcare sector besides other business domains. Large numbers of health organizations have started shifting the electronic health information to the cloud environment. Introducing…
A Review Paper on Currency Recognition System Abstract-In this paper, an algorithm based on the frequency domain feature extraction method is discussed for the detection of currency. This method efficiently utilizes the local spatial features in a currency image to recognize it. The entire system is pre-processed for the optimal and efficient implementation of two…
A Review Paper on Dengue Disease Forcasting Using Data Mining Techniques Abstract-Data Mining is a standout amongst the most comprehensively and rousing zones of research with the motivation behind discovering significant information from vast data collections In Medical ventures, Data Mining gives many points of interest, for example, the location of the extortion in medical…
A Robust and Efficient Approach to License Plate Detection Abstract-This paper presents a robust and efficient method for license plate detection with the purpose of accurately localizing vehicle license plates from complex scenes in real time. A simple yet effective image downscaling method is first proposed to substantially accelerate license plate localization without sacrificing detection…
A robust method for data hiding using images Abstract?A robust method for data hiding using images. We propose, in this paper, a novel edge-adaptive data hiding method for authenticating binary host images. Through establishing a dense edge-adaptive grid (EAG) along the object contours, we use a simple binary image to show that EAG more efficiently…