A Security Modeling Approach forWeb-Service-based Business Processes. Several reports indicate that the highest business priorities include: business improvement, security, and IT management. The importance of security and risk management is gaining that even government statements in some cases have imposed the inclusion of security and risk management within business management. Risk assessment has become an…
A Segmentation and Graph-based Sequence Matching Method for Video Copy Detection Abstract? We propose in this paper a segmentation and graph-based video sequence matching method for video copy detection. Specifically, due to the good stability and discriminative ability of local features, we use SIFT descriptor for video content description. However, matching based on SIFT descriptor…
A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection Abstract? A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection. Some authors have approached the instance selection problem from a meta-learning perspective. In their work, they try to ?nd relationships between the performance of some methods from this ?eld and…
A SIFT-based forensic method for copy-move attack detection and transformation recovery Abstract?One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law.< Final Year...
A Similarity Measure for Text Classification and Clustering Abstract?A Similarity Measure for Text Classification and Clustering. Measuring the similarity between documents is an important operation in the text processing field. In this paper, a new similarity measure is proposed. To compute the similarity between two documents with respect to a feature, < Final Year Projects...
A Similarity-Based Learning Algorithm Using Distance Transformation Abstract? Numerous theories and algorithms have been developed to solve vectorial data learning problems by searching for the hypothesis that best ?ts the observed training sample. However, many real-world applications involve samples that are not described as feature vectors, but as (dis)similarity data. Converting vectorial data into <...
A Single-Ended With Dynamic Feedback Control 8T Subthreshold SRAM Cell Abstract?A novel 8-transistor (8T) static random access memory cell with improved data stability in subthreshold operation is designed. The proposed single-ended with dynamic feedback control 8T static RAM (SRAM) cell enhances the static noise margin (SNM) for ultralow power supply. < final year projects >…
A Space-Bounded Anytime Algorithm for the Multiple Longest Common Subsequence Problem Abstract?A Space-Bounded Anytime Algorithm for the Multiple Longest Common Subsequence Problem. The multiple longest common subsequence (MLCS) problem, related to the identification of sequence similarity, is an important problem in many fields. As an NP-hard problem, its exact algorithms have difficulty in handling large-scale…
A Spectrum Switching Delay-Aware Scheduling Algorithm for Centralized Cognitive Radio Networks Abstract– A Spectrum Switching Delay-Aware Scheduling Algorithm for Centralized Cognitive Radio Networks. We formulate a scheduling problem that takes into account different hardware delays experienced by the secondary users (SUs) in a centralized cognitive radio network (CRN) while switching to different frequency bands. We…
A Speed-Up Scheme Based on Multiple-Instance Pruning for Pedestrian Detection Using a Support Vector Machine Abstract?A Speed-Up Scheme Based on Multiple-Instance Pruning for Pedestrian Detection Using a Support Vector Machine. In pedestrian detection, as sophisticated feature descriptors are used for improving detection accuracy, its processing speed becomes a critical issue. In this paper, we propose…
A Statistical Modeling Approach for Tumor-Type Identification in Surgical Neuropathology Using Tissue Mass Spectrometry Imaging Abstract?Current clinical practice involves classification of biopsied or resected tumor tissue based on a histopathological evaluation by a neuropathologist. In this paper, we propose a method for computer-aided histopathological evaluation using mass spectrometry imaging. Specifically, mass spectrometry imaging can be…
A Strategy of Clustering Modification Directions in Spatial Image Steganography Abstract? Most of the recently proposed steganographic schemes are based on minimizing an additive distortion function de?ned as the sum of embedding costs for individual pixels. In such an approach, mutual embedding impacts are often ignored. In this paper, we present an approach that can…