There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Image-Captioining
The objective is to process by generating textual description from an image – based on the objects and actions in the image. Using generative models so that it creates novel sentences. Pipeline type models uses two separate learning process, one for language modelling and other for image recognition. It first identifies objects in image and provides the result to the Inception-v3 model to convert into word embedding vector than into series of LSTM cells to get desired captions.Frequency-response-characterization-of-CNNs
Travelling-Salesmann-Problem-Using-Genetic-Algorithm-for-Parallel-and-Distributed-Computing
Traveling Salesman Problem is NP-Hard, a lot of methods and solutions are proposed to the problem. One of them is Genetic Algorithm (GA).Human-Activity-Recogntion
Human activity recognition, or HAR, is a challenging time series classification task. It involves predicting the movement of a person based on sensor data and traditionally involves deep domain expertise and methods from signal processing to correctly engineer features from the raw data in order to fit a machine learning model.UNIVERSITY_MANAGEMENT_SYSTEM
UNIVERSITY MANAGEMENT SYSTEMPhoneBook
Implement a phonebook using trie trees as a data structure in C language.High-Dimensional-Visualization-Techniques-and-analysis
Analysis involved various methods to explore and organize the data, including clustering, force-directed layouts, and a timeline for navigating through time-series data. To further analyse temporal attributes, the timeline was distorted through a force directed layout to spatially position time points according to their similarity. Sammon mapping, a variant of MDS, was used as a visualization approach for gene expression data sets along with the heat map-based strategy has been presented for visualizing the U-matrix from self-organizing maps (SOM).Food-Ordering-System
Food Ordering System is an application which will help restaurant to optimized and control over their restaurants.NachOS-System-Calls
System Calls for Nach Operating SystemEscape-BreakOut-Game
Comparison-between-image-encryption-algorithms-for-wireless-sensor
Comparison between image encryption algorithms: SIT and Secure Force AlgorithmsAssignment-3---CSE256
Assignment 3CSE-256-Assignment1
Assignment-1Assignment-4
Assignment-5-CSE-256
Love Open Source and this site? Check out how you can help us