There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Image-Captioining
The objective is to process by generating textual description from an image – based on the objects and actions in the image. Using generative models so that it creates novel sentences. Pipeline type models uses two separate learning process, one for language modelling and other for image recognition. It first identifies objects in image and provides the result to the Inception-v3 model to convert into word embedding vector than into series of LSTM cells to get desired captions.Frequency-response-characterization-of-CNNs
Travelling-Salesmann-Problem-Using-Genetic-Algorithm-for-Parallel-and-Distributed-Computing
Traveling Salesman Problem is NP-Hard, a lot of methods and solutions are proposed to the problem. One of them is Genetic Algorithm (GA).Human-Activity-Recogntion
Human activity recognition, or HAR, is a challenging time series classification task. It involves predicting the movement of a person based on sensor data and traditionally involves deep domain expertise and methods from signal processing to correctly engineer features from the raw data in order to fit a machine learning model.UNIVERSITY_MANAGEMENT_SYSTEM
UNIVERSITY MANAGEMENT SYSTEMPhoneBook
Implement a phonebook using trie trees as a data structure in C language.Food-Ordering-System
Food Ordering System is an application which will help restaurant to optimized and control over their restaurants.NachOS-System-Calls
System Calls for Nach Operating SystemBattery-Usage-and-Sleep-Pattern-Detection
Through this project, our main motive is to design an intelligent method through which the device (a mobile in this case) can predict on its own the user sleep pattern. When would the user sleep or just stop using his phone and hence from these idle hours, one could predict the most suitable time for charging the device. So the main concern of this project was first to get hold of data acquired, from different users, that would help us figure out the exact time slabs in which the users did not use their phone.Escape-BreakOut-Game
Comparison-between-image-encryption-algorithms-for-wireless-sensor
Comparison between image encryption algorithms: SIT and Secure Force AlgorithmsAssignment-3---CSE256
Assignment 3CSE-256-Assignment1
Assignment-1Assignment-4
Assignment-5-CSE-256
Love Open Source and this site? Check out how you can help us