Tumor Recognition in Wireless Capsule Endoscopy Images Using Textural Features and SVM-Based Feature Selection Abstract? Tumor in digestive tract is a common disease and wireless capsule endoscopy (WCE) is a relatively new technology to examine diseases for digestive tract especially for small intestine. This paper addresses the problem of automatic recognition of tumor < Final...
Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development Abstract? Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Base Paper Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting…
Twitter data analysis by means of Strong FlippingGeneralized Itemsets Abstract?Social Network Services (SNS) like Facebook, Twitter, Sina Weibo etc. are widely used all over the world today. People use them to keep in touch with friends and make new friends online. In China, Sina Weibo is one of the most successful social network service and…
Two 122-GHz Phase-Locked Loops in 65-nm CMOS Technology Abstract? Two 122-GHz phase-locked loops (PLLs) have been developed based on a 65-nm Si CMOS technology, and their performances are compared. For the first PLL, a voltage-controlled oscillator (VCO) with a frequency doubler embedded in the oscillator core was employed (PLL1), while the second PLL employs a…
Two cooperative ant colonies for feature selection using fuzzy models Abstract? The available set of potential features in real-world databases is sometimes very large,< Final Year Projects > and it can be necessary to find a small subset for classification purposes. One of the most important techniques in data pre-processing for classification is feature selection….
Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems Abstract-Attribute-based encryption, especially for ciphertext-policy attribute-based encryption, can fulfill the functionality of fine-grained access control in cloud storage systems. Since users? attributes may be issued by multiple attribute authorities, multi-authority ciphertext-policy attributebased encryption is an emerging cryptographic primitive for enforcing attribute-based access control…
Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems Abstract?Attribute-based encryption, especially for ciphertext-policy attribute-based encryption, can fulfill the functionality of fine-grained access control in cloud storage systems. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…
Two-Level QR Code for Private Message Sharing and Document Authentication Abstract? The quick response (QR) code was designed for storage information and high-speed reading applications. We present a new rich QR code that has two storage levels and can be used for document authentication. This new rich QR code, named two-level QR code, has public…
Two-Way OFDM-Based Nonlinear Amplify-and-Forward Relay Systems Abstract? We derive closed-form outage probability expressions for fixed-gain (FG) and variable-gain (VG) two-way amplify-and-forward (AF) relay networks subject to a nonlinear transmission at the relay. We then derive an explicit expression for the relay gain that optimizes the network?s performance. Finally, we show that, if the source nodes…
Two-Way Satellite Relaying With Estimated Channel Gains Abstract? we consider the two-way relaying of the data of two earth stations (ESs) via satellite links. The satellite is considered to be of transparent type, which only receives the signals over the uplink and broadcasts these signals with some transponder gain over its downlink frequencies. The two-way…
Typicality-Based Collaborative Filtering Recommendation Abstract? Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy, and big-error in predictions. We borrow ideas of object typicality from cognitive psychology and propose a novel typicality-based collaborative filtering recommendation method named TyCo. A…