Showing 685–696 of 3871 results

  • ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds

    ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds

    0 out of 5
    4,500

    ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds Abstract?ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds. The Success of cloud computing makes an increasing number of real-time applications such as signal processing and weather forecasting run in the cloud. Meanwhile, scheduling for real-time tasks is playing an essential role for a cloud provider…

  • Animal Recognition and Identification with Deep Convolutional Neural Networks for Automated Wildlife Monitoring

    Animal Recognition and Identification with Deep Convolutional Neural Networks for Automated Wildlife Monitoring

    0 out of 5
    4,500

    Animal Recognition and Identification with Deep Convolutional Neural Networks for Automated Wildlife Monitoring Abstract-Efficient and reliable monitoring of wild animals in their natural habitats is essential to inform conservation and management decisions using Digital Image Processing Projects. Automatic covert cameras or ?camera traps? are being an increasingly popular tool for wildlife monitoring due to their…

  • Annotating search result from web data bases

    Annotating search result from web data bases

    0 out of 5
    4,500

    Annotating search result from web data bases   Abstract? An increasing number of databases have become web accessible through HTML form-based search interfaces. The data units returned from the underlying database are usually encoded into the result pages dynamically for human browsing. < Final Year Projects >For the encoded data units to be machine processable,…

  • Anomaly Detection for Road Traffic: A Visual Analytics Framework

    Anomaly Detection for Road Traffic: A Visual Analytics Framework

    0 out of 5
    4,500

    Anomaly Detection for Road Traffic: A Visual Analytics Framework Abstract– The analysis of large amounts of multidimensional road traffic data for anomaly detection is a complex task. Visual analytics can bridge the gap between computational and human approaches to detecting anomalous behavior in road traffic, making the data analysis process more transparent. In Addition, present…

  • Anomaly Detection for Road Traffic: A Visual Analytics Framework

    Anomaly Detection for Road Traffic: A Visual Analytics Framework

    0 out of 5
    4,500

    Automobile Spare Shop(Android App) Abstract-The analysis of large amounts of multidimensional road traffic data for anomaly detection is a complex task. Visual analytics can bridge the gap between computational and human approaches to detecting anomalous behavior in road traffic, making the data analysis process more transparent. In this paper, we present a visual analytics framework…

  • Anomaly Detection in Extremely Crowded Scenes Using Spatio-Temporal Motion Pattern Models

    Anomaly Detection in Extremely Crowded Scenes Using Spatio-Temporal Motion Pattern Models

    0 out of 5
    4,500

    Anomaly Detection in Extremely Crowded Scenes Using Spatio-Temporal Motion Pattern Models Abstract?Anomaly Detection in Extremely Crowded Scenes Using Spatio-Temporal Motion Pattern Models. Extremely crowded scenes present unique challenges to video analysis that cannot be addressed with conventional approaches. We present a novel statistical framework for modeling the local spatio-temporal motion pattern behavior of extremely crowded…

  • Anonymization of centralized and distributed social network by sequential clustering

    Anonymization of centralized and distributed social network by sequential clustering

    0 out of 5
    4,500

    Anonymization of centralized and distributed social network by sequential clustering. We study the problem of privacy-preservation in social networks. We consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data…

  • Anonymization of Centralized and Distributed Social Networks by Sequential Clustering

    Anonymization of Centralized and Distributed Social Networks by Sequential Clustering

    5.00 out of 5
    4,500

    Abstruct The problem of privacy-preservation in social networks. We consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data holders information about links between nodes that are controlled by other…

  • Answering Pattern Queries Using Views

    Answering Pattern Queries Using Views

    0 out of 5
    4,500

    Answering Pattern Queries Using Views Abstract?Answering queries using views has proven effective for querying relational and semi-structured data. This paper investigates this issue for graph pattern queries based on graph simulation. We propose a notion of pattern containment to characterize graph pattern matching using graph pattern views. We show that a pattern query can be…

  • Answering Pattern Queries Using Views

    Answering Pattern Queries Using Views

    0 out of 5
    4,500

    Answering Pattern Queries Using Views Abstract? Answering Pattern Queries Using Views. Answering queries using views has proven effective for querying relational and semi-structured data. This paper investigates this issue for graph pattern queries based on graph simulation. We propose a notion of pattern containment to characterize graph pattern matching using graph pattern views. We show…

  • Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler

    Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler

    0 out of 5
    4,500

    Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler Abstract?Research into developing effective computer aided techniques for planning software projects is important and challenging for software engineering. Different from projects in other fields, software projects are people-intensive activities and their related resources are mainly human resources. Thus, an adequate model for…

  • Antenna Selection for Reliable MIMO-OFDM Interference Alignment Systems: Measurement Based Evaluation

    Antenna Selection for Reliable MIMO-OFDM Interference Alignment Systems: Measurement Based Evaluation

    0 out of 5
    5,500

    Antenna Selection for Reliable MIMO-OFDM Interference Alignment Systems: Measurement Based Evaluation Abstract? Interference alignment (IA) is a promising trans-mission technology enabling essentially the maximum achievable degrees of freedom (DoF) in K-user multiple-input multiple-output (MIMO) interference channels. The ideal DoF of IA systems have been obtained using independent MIMO channels, which is usually hardly observed in…

End of content

End of content