A real-time applicable hand gesture recognition system 

Get Complete Project Material File(s) Now! » On the nature of hands A number of theories have been developed to explain the evolutionary dierence of the human and the animal world. Putting the emphasis on one or only some of...

Extending Gossip Algorithms to Estimation of U-statistics 

Get Complete Project Material File(s) Now! » Decentralized estimation of U-statistics Decentralized estimation have many applications in sensor and peer-topeer networks as well as for extracting knowledge from massive information graphs such as interlinked Web documents and on-line social media....

a Distributed Stream Data Cleaning System 

Get Complete Project Material File(s) Now! » Large-scale Data Analysis Systems Over the last decade, numerous large-scale data analysis systems have emerged to address the big data challenge. Unlike the traditional DBMS which runs in a single machine, these systems...

Diversity of morphological characteristics

Get Complete Project Material File(s) Now! » Positioning in the literature Due to the aforementioned needs and challenges, there is now a body of literature in computational vision devoted to fine-grained recognition, including identifying botanical species, and designed for both...

Maximizing the hit ratio of dynamic caches through optimal bundling 

Get Complete Project Material File(s) Now! » FOCAL: joint Forwarding and Caching with Latencyawareness Caching needs to be supported by proper packet forwarding [Rossini and Rossi, 2014; Dehghan et al., 2015] as the performance of the first is driven by...

A Hardware Platform for Real-time Image Understanding 

Get Complete Project Material File(s) Now! » Dataflow Computing The third contribution of this thesis is a custom dataflow computer architecture optimized for the computation of convolutional networks (such as the model presented in Section 2). Dataflow computers are a...

Countermeasures and Security methodologies

Get Complete Project Material File(s) Now! » Asset protection and data security Asset protection is a set of preventive techniques generally based on cryptographic primitives whose goal is to protect confidentiality and integrity and authenticity of data assets, software assets,...

STRATEGY GAME FOR FLOW/INTERFACE ASSOCIATION IN MULTI-INTERFACE MOBILE TERMINALS

Get Complete Project Material File(s) Now! » Motivations Once a terminal is equipped with several interfaces, it becomes possible to use simultaneously the various interfaces - and not simply to switch from one to another. In this document, the term...

The 3D Active Shape Model Construction Using 3D Morphable Model to Generate Data

Get Complete Project Material File(s) Now! » Literature Review about Automatic 2D Landmark Location A lot of algorithms have been proposed for facial landmark location for 2D images. As suggested by Hamouz et al.(Hamouz 2005) [30], they can be classied...

Minimax strategy for Stratified Sampling for Monte Carlo 

Get Complete Project Material File(s) Now! » Preliminaries The allocation problem mentioned in the previous section is formalized as a K-armed bandit problem where each arm (stratum) k = 1, . . . ,K is characterized by a distribution νk...