Showing 3853–3864 of 3870 results

  • Webpage prediction for services scale locations

    0 out of 5
    4,500

    Webpage prediction for services scale locations Abstract-In this project we have maintain the client information and user which website using. Login Admin have retrieve the client information from sql. We have analysis the client website information with data mining concept. Every client must register. Admin view the minimum and maximum user?s client website usage and…

  • Placeholder

    Weed Classification

    0 out of 5
    4,500

    Weed Classification Abstract?Weed Classification, This paper proposes two methods, oriented to crop row detection in images from agriculture fields with high weed pressure and to further distinguish between weed and crop. Firstly, for crop row detection the image processing consists of three main processes: image segmentation, double thresholding based on the 3D-Otsu’s method, and crop…

  • Placeholder

    Weighted Data Gravitation Classification for Standard and Imba

    0 out of 5
    4,500

    Weighted Data Gravitation Classification for Standard and Imba Abstract?Weighted Data Gravitation Classification for Standard and Imba. Gravitation is a fundamental interaction whose concept and effects applied to data classification become a novel data classification technique. The simple principle of data gravitation classification (DGC) is to classify data samples by comparing the gravitation between different classes….

  • Weighted Level Set Evolution Based on Local Edge Features for Medical Image Segmentation

    0 out of 5
    4,500

    Weighted Level Set Evolution Based on Local Edge Features for Medical Image Segmentation Abstract– Level set methods have been widely used to implement active contours for image segmentation applications due to their good boundary detection accuracy. In the context of medical image segmentation, weak edges and inhomogeneities remain important issues that may hinder the accuracy…

  • Weighted Sum-Rate Maximization for MIMO Downlink Systems Powered by Renewables

    0 out of 5
    5,500

    Weighted Sum-Rate Maximization for MIMO Downlink Systems Powered by Renewables Abstract? Optimal resource management for smart grid powered multi-input multi-output (MIMO) systems is of great importance for future green wireless communications. A novel framework is put forth to account for the stochastic renewable energy sources (RES), dynamic energy prices, as well as random wireless channels….

  • Weighted Svm With Classification Uncertainty For Small Training Samples

    0 out of 5
    5,500

    Weighted Svm With Classification Uncertainty For Small Training Samples Abstract?Existing maximum-margin support vector machines (SVMs) generate a hyperplane which produces the clearest separation between positive and negative feature vectors. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…

  • White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures

    0 out of 5
    4,500

    White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures Abstract? White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively

    0 out of 5
    5,500

    White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively Abstract-Ciphertext-policy attribute-based encryption (CP-ABE) has been proposed to enable fine-grained access control on encrypted data for cloud storage service. In the context of CP-ABE, since the decryption privilege is shared by multiple users who have the same attributes, it…

  • Wide-Range Adaptive RF-to-DC Power Converter for UHF RFIDs

    0 out of 5
    5,500

    Wide-Range Adaptive RF-to-DC Power Converter for UHF RFIDs Abstract? A wide-range, differential, cross-coupled rectifier is proposed with an extended dynamic range of input RF power that enables wireless powering from varying distances. The proposed architecture mitigates the reverse-leakage problem in conventional, cross-coupled rectifiers without degrading sensitivity. A prototype is designed for UHF RFID applications, and…

  • Wind Turbine Accidents: A Data Mining Study

    0 out of 5
    4,500

    Wind Turbine Accidents: A Data Mining Study Abstract– While the global production of wind energy is increasing, there exists a significant gap in the academic and practice literature regarding the analysis of wind turbine accidents.With this intension, presents the results obtained from the analysis of 240 wind turbine accidents from around the world. The main…

  • Wireless Resource Allocation in Next Generation Healthcare Facilities

    0 out of 5
    4,500

    Wireless Resource Allocation in Next Generation Healthcare Facilities Abstract? Wireless Resource Allocation in Next Generation Healthcare Facilities. Healthcare facilities with intelligent wireless devices can reduce the workload of the paramedic staff. These devices include low-power wireless sensors, personal wireless hub (PWH), and receivers. The PWH can act as a relay in the hospital network. To…

  • Word Segmentation Method for Handwritten Documents based on Structured Learning

    0 out of 5
    4,500

    Word Segmentation Method for Handwritten Documents based on Structured Learning Abstract? Word Segmentation Method for Handwritten Documents based on Structured Learning. Segmentation of handwritten document imagesinto text-lines and words is an essential task for optical character recognition. However, since the features of handwritten document are irregular and diverse depending on the person, it is considered…

End of content

End of content