Robust Blur Kernel Estimation for License Plate Images From Fast Moving Vehicles Abstract? As the unique identification of a vehicle, license plate is a key clue to uncover over-speed vehicles or the ones involved in hit-and-run accidents. However, the snapshot of over-speed vehicle captured by surveillance camera is frequently blurred due to fast motion, which…
Robust Cell Detection of Histopathological Brain Tumor Images Using Sparse Reconstruction and Adaptive Dictionary Selection Abstract? Successful diagnostic and prognostic stratification, treatment outcome prediction, and therapy planning depend on reproducible and accurate pathology analysis. Computer aided diagnosis (CAD)is a useful tool to help doctors make better decisions in cancer diagnosis and treatment. Accurate cell detection…
Robust Point Set Matching for Partial Face Recognition Abstract?In many real-world scenarios especially some unconstrained environments, human faces might be occluded by other objects, and it is difficult to obtain fully holistic face images for recognition. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides…
Robust Retinal Vessel Segmentation via Locally Adaptive Derivative Frames in Orientation Scores Abstract? A robust and fully automatic filter-based approach for retinal vessel segmentation. We propose new filters based on 3D rotating frames in so-called orientation scores, which are functions on the Lie-group domain of positions and orientations R 2S1. By means of a wavelet-type…
Routing in Socially Selfish Delay Tolerant Networks Abstract-Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are socially selfish; i.e., they are willing to forward packets for nodes with whom they have social ties but not others, and such…
Automatic Attendance Management System Using Face Recognition Abstract? Although kNN search on a road network Gr, i.e., finding k nearest objects to a query user q on Gr, has been extensively studied, existing works neglected the fact that the q?s social information can play an important role in this kNN query. Many real-world applications, such…
Run Time Application Repartitioning in Dynamic Mobile Cloud Environments Abstract?Abstract As mobile computing increasingly interacts with the cloud, a number of approaches, e.g., MAUI and CloneCloud, have been proposed, aiming to offload parts of the mobile application execution to the cloud. To achieve a good performance by using these approaches, they particularly focus on the…
S3K: Scalable Security With Symmetric Keys?DTLS Key Establishment for the Internet of Things Abstract?Abstract DTLS is becoming the de facto standard for communication security in the Internet of Things (IoT). In order to run the DTLS protocol, one needs to establish keys between the communicating devices. The default method of key establishment requires X.509 certificates…
Saliency-based Lesion Segmentation via Background Detection in Dermoscopic Images Abstract– The segmentation of skin lesions in dermoscopic images is a? fundamental step in automated computer-aided diagnosis (CAD) of melanoma. Conventional segmentation methods, however, have difficulties when the lesion borders are indistinct and when contrast between the lesion and the surrounding skin is low. They also…
Salient Object Segmentation via Effective Integration of Saliency and Objectness Abstract– An effective salient object segmentation method via the graph-based integration of saliency and objectness. Based on the superpixel segmentation result of the input image, a graph is built to represent superpixels using regular vertex, background seed vertex with the addition of a terminal vertex….
Salient Region Detection via High-Dimensional Color Transform and Local Spatial Support Abstract? A novel approach to automatically detect salient regions in an image. Our approach consists of global and local features, which complement each other to compute a saliency map. The first key idea of our work is to create a saliency map of an…
Scalable Algorithms for Nearest-Neighbor Joins on Big Trajectory Data Abstract? Trajectory data are prevalent in systems that monitor the locations of moving objects. In a location-based service, for instance, the positions of vehicles are continuously monitored through GPS; the trajectory of each vehicle describes its movement history.We study joins on two sets of trajectories, generated…