Showing 877–888 of 3871 results

  • Dotnet Project

    Blood Banking System

    0 out of 5
    3,500

    Blood Banking System   Abstract? Blood Banking System. Due to the critical blood shortages in South Africa and around the world, the assignment of blood can be considered an important real world optimization problem. This paper presents a mathematical model that facilitates good management and assignment of red blood cell units in order to minimize…

  • BLOOD BANKING SYSTEM WITH GPS USING ANDROID

    BLOOD BANKING SYSTEM WITH GPS USING ANDROID

    0 out of 5
    3,500

    BLOOD BANKING SYSTEM WITH GPS USING ANDROID Abstract? BLOOD BANKING SYSTEM WITH GPS USING ANDROID Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference…

  • Blood Vessel Segmentation of Fundus Images by Major Vessel Extraction and Subimage Classi?cation

    Blood Vessel Segmentation of Fundus Images by Major Vessel Extraction and Subimage Classi?cation

    0 out of 5
    4,500

    Blood Vessel Segmentation of Fundus Images by Major Vessel Extraction and Subimage Classi?cation Abstract?A novel three-stage blood vessel segmentation algorithm using fundus photographs. In the ?rst stage, the green plane of a fundus image is preprocessed to extract a binary image after high-pass ?ltering, and another binary image from the morphologically reconstructed enhanced image for…

  • Matlab_Dip

    Blur and Illumination Robust Face Recognition via Set-Theoretic Characterization

    0 out of 5
    4,500

    Blur and Illumination Robust Face Recognition via Set-Theoretic Characterization. We address the problem of unconstrained face recognition from remotely acquired images. The main factors that make this problem challenging are image degradation due to blur, and appearance variations due to illumination and pose. In this paper, we address the problems of blur and illumination. We…

  • Body Node Coordinator Placement Algorithms for Wireless Body Area Networks

    Body Node Coordinator Placement Algorithms for Wireless Body Area Networks

    0 out of 5
    4,500

    Body Node Coordinator Placement Algorithms for Wireless Body Area Networks Abstract? Body Node Coordinator Placement Algorithms for Wireless Body Area Networks. Wireless body area networks < Final Year Projects 2016 > WBANs are intelligent wireless monitoring systems, consisting of wearable, and implantable computing devices on or in the human body. They are used to support…

  • Book shopping website

    Book shopping website

    0 out of 5
    4,500

    Book shopping website Abstract-Online Book Shopping Website acts as a central database containing various books in stock along with their title, author and cost. This project is a website that acts as a central bookstore. This web project is developed using vb.net as the front end and sql as a back-end. The sql database stores…

  • Book Store Management System

    Book Store Management System

    0 out of 5
    3,500

    Book Store Management System Abstract? Book Store Management System. The Library Management System provides real time information about the books available in the Library and the user information. The main purpose of this project is to reduce the manual work. The project is < Final Year Projects 2016 > specifically designed for the use of…

  • Book store management system

    Book store management system

    0 out of 5
    4,500

    Book store management system Abstract-Online bookstore software projects that acts as a central database containing various books in stock along with their title, author and cost. This project is a website that acts as a central bookstore. This web project is developed using asp.net as the front end and sql as a back-end. The sql…

  • Boosting 3D LBP-Based Face Recognition by Fusing Shape and Texture Descriptors on the Mesh

    Boosting 3D LBP-Based Face Recognition by Fusing Shape and Texture Descriptors on the Mesh

    0 out of 5
    5,500

    Boosting 3D LBP-Based Face Recognition by Fusing Shape and Texture Descriptors on the Mesh Abstract? A novel approach for fusing shape and texture local binary patterns (LBPs) on a mesh for 3D face recognition. Using a recently proposed framework, we compute LBP directly on the face mesh surface, then we construct a grid of the…

  • Java Projects—Data Mining

    Boosting Response Aware Model-Based Collaborative Filtering

    0 out of 5
    4,500

    Boosting Response Aware Model-Based Collaborative Filtering Abstract? Boosting Response Aware Model-Based Collaborative Filtering. Recommender systems are promising for providing personalized favorite services. Collaborative filtering < Final Year Projects 2016 > technologies, making prediction of users? preference based on users? previous behaviors, have become one of the most successful techniques to build modern recommender systems. Several…

  • Botnet Detection based on Anomaly and Community Detection

    Botnet Detection based on Anomaly and Community Detection

    0 out of 5
    5,500

    Botnet Detection based on Anomaly and Community Detection Abstract? A novel two-stage approach for the important cyber-security problem of detecting the presence of a botnet and identifying the compromised nodes (the bots), ideally before the botnet becomes active. The first stage detects anomalies by leveraging large deviations of an empirical distribution. We propose two approaches…

  • Botnet Detection based on Anomaly and Community Detection

    Botnet Detection based on Anomaly and Community Detection

    0 out of 5
    5,500

    Botnet Detection based on Anomaly and Community Detection Abstract? A novel two-stage approach for the important cyber-security problem of detecting the presence of a botnet and identifying the compromised nodes (the bots), ideally before the botnet becomes active. The first stage detects anomalies by leveraging large deviations of an empirical distribution. We propose two approaches…

End of content

End of content