SENTIMENT EXTRACTION | M Tech PhD Thesis Guidance

SENTIMENT EXTRACTION Sentiment analysis – or else known as opinion mining .In short, it is the process of defining the expressive tone behind a series of words, in the habit of gain an understanding of the attitudes, opinions and emotions Read More …

INTERNET PROTOCOL VERSION 4 (IPv4) | M Tech PhD Thesis Guidance

INTERNET PROTOCOL VERSION 4 (IPv4) IPv4 provides hierarchical addressing for the packet that carries out data. It can provide a maximum of 232 possible address spaces, out of which there  are  about  18  million  private  addresses  and  270  million  multicast addresses. Read More …

Load flow Analysis | Thesis help in Chandigarh

Load Flow Analysis Load flow analysis is the most important and essential approach to investigating problems in power system operating and planning. Based on a specified generating state and transmission network structure, load flow analysis solves the steady operation state Read More …

DG Modelling Distribution Load Flow Analysis | Thesis Work Chandigarh

DG Modelling Distribution Load Flow Analysis | Thesis Work Chandigarh Today distribution systems are greatly changed in comparison with older conventional systems that used to provide the electricity power directly to consumer from transmission systems and consequently the conventional fossil Read More …

ARTIFICIAL BEE COLONY OPTIMIZATION

ARTIFICIAL BEE COLONY OPTIMIZATION Artificial Bee Colony (ABC) is one of the most recently defined algorithms by Dervis Karabogain 2005, motivated by the intelligent behaviour of honey bees. It is as simple as Particle Swarm Optimization (PSO) and Differential Evolution (DE) Read More …

IRIS RECOGNITION METHODS | Thesis Guidance in Chandigarh

IRIS RECOGNITION METHODS Daugman method The method of Daugman uses an integral-differential operator designed for locate the circular iris and pupil regions with the upper and lower eyelids arcs. The operator finds the circular path in which there is more Read More …

CANNY EDGE DETECTION | Best Thesis Guidance

CANNY EDGE DETECTION It checks the pupil and iris boundaries from image being captured. It shows the efficient eye edges. Therefore, the accurate pupil edge is produced for detecting the image. The algorithm consists of five different steps, namely, Finding, Read More …

DWT (Discreet Wavelet Transform) | Thesis Work | M Tech PhD Thesis

DWT (Discreet Wavelet Transform) The discrete wavelet transform is a valuable way designed for signal exploration as well as picture handling, chiefly in multi-resolution description. Wavelets are described as the functions obtained over a fixed interval and have zero as Read More …

Types and Application of Steganography

TYPES OF STEGANOGRAPHY The four principle classifications of steganography in light of nature of file format and also the arrangement of image steganography are demonstrated in Figure below.   Text Steganography The colors are generated from three primary colors as Read More …

CATEGORIZING NETWORK ATTACKS IN MANET

CATEGORIZING NETWORK ATTACKS IN MANET The network attacks can be categorized into two types, namely, external attacks and internal attacks. The description for the same is defined below: EXTERNAL ATTACKS These sorts of attacks attempt to bring about clogging situation Read More …