crime detection system
Resilient identity crime detectionfree downloadIt also needs to ignore redundant attributes which have many missing values, and other issues. 1.2 Existing Identity Crime Detection System There are nondata mining layers of defence to protect against credit application fraud, each with its unique strengths and weaknesses PerpSearch: an integrated crime detection system free downloadInformation technologies such […]
IOT INTERNET OF THINGS 2019
The Internet of Things (IoT) refers to a system of interrelated, internet-connected objects that are able to collect and transfer data over a wireless network without human intervention. The personal or business possibilities are endless. The Internet of things is a system of interrelated computing devices, mechanical and digital machines that are provided with unique […]
smart city 2019
A smart city is an urban area that uses different types of electronic methods and sensors to collect data. Insights gained from that data are used to manage assets, resources and services efficiently; in return, that data is used to improve the operations across the city. Smart cities use intelligent solutions to optimize infrastructure and […]
fingerprint verification
A correlation-based fingerprint verification systemfree downloadIn this paper, a correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this system directly uses the richer gray-scale information of the fingerprints. The correlation-based fingerprint verification system first Fingerprint verification system using minutiae extraction techniquefree downloadMost fingerprint recognition techniques are based on minutiae matching and have […]
face verification
Face verification is an important tool for authentication of an individual and it can be of significant value in security and e-commerce applications. This paper deals with the application of correlation filters for face verification . The performance of a specific type of On Matching Scores for LDA-based Face Verification .free downloadWe address the problem […]
Credit card validation
A novel idea for credit card fraud detection using decision treefree downloadincoming transaction is fraud or genuine.In our proposed model, we have found out validation of card Ekrem Duman, M. Hamdi Ozcelik Detecting credit card fraud by Abhinav Srivastava, Amlan Kundu, Shamik Sural and Arun K. Majumdar, CreditCard Fraud DetectionAbstract-The Luhn algorithm is the first […]
artificial brain blue brain
Blue brain is the name given to the world’s first virtual brain. That means a machine that can function as human brain. There is an attempt to create an artificial brain that can think, response, take decision, and keep anything in memory The blue brain project (BPP) makes use of the Blue Gene supercomputer developed […]
nanotechnology
Introduction to Nanomaterial and Nanotechnologyfree download2 2011 and so you make the substance. Richard Feynman(1959). Theres Plenty of Room at the Bottom. Lei Wang. Graduate Seminar Phys730. 1 Nanotechnologyfree downloadThe Nanotechnology Program Projects and NEDOs Project Management . 20 ed research topics pursued by AIST. AIST, the ogy seminars. AIST has Nanotechnology: Opportunities in Textilesfree […]
6G wireless technology
Upcoming Technologies: 5G and 6G International Journal of free downloadAbstract: The world wide uprising in mobile is changing our lives in terms of the technologies used, the way we work on 6G with certain assumptions that are described in the paper. http://pediain.com/seminar/5g-mobile-technology-. 6G Technology IRJETfree downloadAbstract Wireless communications is the transferring of information between two […]
Middleware Technologies
comparison of middleware technologies in windows xp and free downloadABSTRACT: The essay here discussed is about the Middleware Technologies Technologies or Middleware Technologies like CORBA, JAVA/RMI, and. COM. Middleware (Technologies) free downloadTime time = (Time) Naming.lookup(rmi:// + host + /ServerTime);. System.err.println(Server reports: + time.getTime().toString());. } } Remote Method Invocation EBU Tech 3300s1-2005 The middleware report; […]