Exposing Digital Image Forgeries by Illumination Color Classification Abstract? photographs have been used to document space-time events and they have often served as evidence in courts. Although photographers are able to create composites of analog pictures, this process is very time consuming and requires expert knowledge. Today, however, powerful digital image editing software makes image…
FACE AND EAR FUSION RECOGNITION BASED ON MULTI-AGENT Abstract? Data fusion is one of the most important problems in current image processing field. Non-invasive characteristic of ear and profile face recognition contrary to other biometric recognition, unique ear features and ubiety about face and ear of 3D human head ensure the feasibility for fusing face…
Fairness aware & privacy preserving friend matching protocol Abstract? Fairness aware & privacy preserving friend matching protocol. Mobile social networks represent a promising cyber-physical system, which connects mobile nodes within a local physical proximity using mobile smart phones as well as wireless communication. In mobile social networks, the mobile users may, however, face the risk…
Fast Transmission to Remote Cooperative Groups:A New Key Management Paradigm sequence and plain text Abstract? The problem of efficiently and securely broadcasting to a remote cooperative group occurs in many newly emerging networks. A major challenge in devising such systems is to overcome the obstacles of the potentially limited communication from the group to the…
Feature Selection for Machine Learning: Comparing a Correlation based Filter Approach to the Wrapper Abstract? Feature selection is often an essential data processing step prior to applying a learning algorithm. The removal of irrelevant and redundant information often improves the performance of machine learning algorithms. There are two common approaches:< Final Year Projects > a…
Fovea center detection based on the retina anatomy and mathematical morphology Abstract?Fovea center detection based on the retina anatomy and mathematical morphology Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections…
From the Cloud to the Atmosphere: Running MapReduce across Datacenters Abstract? Efficiently analyzing big data is a major issue in our current era. Examples of analysis tasks include identification or detection of global weather patterns, economic changes, social phenomena, or epidemics. The cloud computing paradigm along with software tools such as implementations of the popular…
Further Results on Delay-Dependent Stability of Multi-Area Load Frequency Control Abstract?Further to results reported by Jiang , this paper investigates delay-dependent stability of load frequency control (LFC) emphasizing on multi-area and deregulated environment. Based on Lyapunov theory and the linear matrix inequality technique, a new stability criterion is proposed to improve calculation accuracy and to…
General Framework to Histogram-Shifting-Based Reversible Data Hiding Abstract?Histogram shifting (HS) is a useful technique of reversible data hiding (RDH). With HS-based RDH, high capacity and low distortion can be achieved efficiently. In this paper, we revisit the HS technique and present a general framework to construct HS-based RDH. By the proposed framework, one can get…
Geometry-Based Object Association and Consistent Labeling in Multi-Camera Surveillance Abstract-A multi-camera surveillance framework based on multiple view geometry. We address the problem of object association and consistent labeling through exploring geometrical correspondences of objects, not only in sequential frames from a single camera view but also across multiple camera views. < Final Year Project >The…
Ginix: Generalized Inverted Index for Keyword Search Abstract?Keyword search has become a ubiquitous method for users to access text data in the face of information explosion. Inverted lists are usually used to index underlying documents to retrieve documents according to a set of keywords efficiently. Since inverted lists are usually large, many compression techniques have…
Group Level Activity Recognition in Crowded Environments across Multiple Cameras Abstract?Storage-as-a-service offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloud-based storage scheme that allows the data owner to benefit from the facilities offered…