Implementation of Real Time Dress-up System based on Image Blending Abstract? Implementation of high performance multi-camera / multi-sensor imaging systems that are required to produce real-time video output pose a large number of unique challenges to conventional digital design based on general-purpose processors or GPUs.< Final Year Projects > In potential application areas ranging from…
Improved Additive-Wavelet Image Fusion Abstract?Effective image-fusion methods inject the necessary geometric information and preserve the radiometric information. To preserve the radiometric information, the injected high frequency of a panchromatic (pan) image must follow the frequency of the multispectral (MS) image. In this letter,< Final Year Projects > an improved additive-wavelet (AW) fusion method is presented…
Improving the Separability of Motor Imagery EEG Signals Using a Cross Correlation-Based Least Square Support Vector Machine for Brain?Computer Interface Abstract?Although brain-computer interface (BCI) techniques have been developing quickly in recent decades, there still exist a number of unsolved problems, such as improvement of motor imagery (MI) signal classification. < Final Year Projects > In…
Incentive Driven Information Sharing in Delay Tolerant Mobile Networks Abstract?Mobile wireless devices (e.g., smartphones, PDAs, and notebooks) play important roles in our daily life, e.g., users often use such devices for bank transactions, keep in touch with friends. Users can also store such information and share with one another via opportunistic peer to peer links….
Infected Fruit Part Detection Using K-Means Clustering Segmentation Technique Abstract?Nowadays, overseas commerce has increased drastically in many countries. Plenty fruits are imported from the other nations such as oranges, apples etc. Manual identification of defected fruit is very time consuming. This work presents a novel defect segmentation of fruits based on color features with K-means…
Information-Theoretic Outlier Detection for Large-Scale Categorical Data Abstract? Outlier detection can usually be considered as a pre-processing step for locating, in a data set, those objects that do not conform to well-defined notions of expected behavior. It is very important in data mining for discovering novel or rare events, anomalies, vicious actions, exceptional phenomena, etc….
INTELLIGENT LOAD-FREQUENCY CONTROL IN A DEREGULATED ENVIRONMENT: This study presents an intelligent solution for load-frequency control in a restructured power system using a modified traditional frequency response model, suitable for a bilateral-based deregulation policy. The new approach is based on an extended classifier system with continuous-valued inputs (XCSR) which is the most successful learning classifier…
JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques Abstract?Blind steganalysis of JPEG images is addressed by modeling the correlations among the DCT coefficients using K -variate (K ? 2) p.d.f. estimates (p.d.f.s) constructed by means of Markov random field (MRF) cliques. < Final Year Project >The reasoning of using high variate p.d.f.s together…
key management for multiple multicast groups in wireless networks Abstract? The emergence of diverse group-based services, multiple multicast groups are likely to coexist in a single network, and users may subscribe to multiple groups simultaneously. However,< Final Year Project > the existing group key management (GKM) schemes, aiming to secure communication within a single group,…
Lightweight Location Verification Algorithms for Wireless Sensor Networks Abstract? The knowledge of sensors’ locations is crucial information for many applications in Wireless Sensor Networks (WSNs). When sensor nodes are deployed in hostile environments, the localization schemes are vulnerable to various attacks, e.g., wormhole attack, pollution attack, range enlargement/reduction attack, and etc. Therefore, sensors’ locations are…
Lossy Compression and Iterative Reconstruction for Encrypted Image Abstract?This work proposes a novel scheme for lossy compression of an encrypted image with flexible compression ratio. A pseudorandom permutation is used to encrypt an original image, and the encrypted data are efficiently compressed by discarding the excessively rough and fine information of coefficients generated from orthogonal…