m-Privacy for Collaborative Data Publishing Abstract? we consider the collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. We consider a new type of “insider attack” by colluding data providers who may use their own data records (a subset of the overall data) in addition to the external background knowledge…
Medical image enhancement using intuitionistic fuzzy set Abstract? A novel image enhancement of medical images using intuitionistic fuzzy set theory is presented. In many image processing problems, preprocessing is required to improve the quality of images before processing. But for medical images, image enhancement is very useful as medical images are poorly illuminated and…
Microscopy blood cell segmentation Abstract?Digital Holographic Microscopy (DHM) is becoming recently very popular for cell imaging. The main advantage of digital holographic microscopy over classical microscopy techniques is that it does not only provide the projected image of the object but also provides three dimensional information of the object’s optical thickness. DHM technology could be…
Mining Contracts for Business Events and Temporal Constraints in Service Engagements Abstract? Contracts are legally binding descriptions of business service engagements. In particular, we consider business events as elements of a service engagement. Business events such as purchase, delivery, bill payment, bank interest accrual not only correspond to essential processes but are also inherently temporally…
Mining frequent patterns from dynamic data streams with data load management Abstract?In many applications, data-stream sources are prone to dramatic spikes in volume, which necessitates load shedding for data-stream processing systems. In this research, we study the load-shedding problem for frequent-pattern discovery in transactional data streams.< Final Year Project > A load-controllable mining system with…
Mining User Queries with Markov Chains Abstract? We propose a novel method for automatic annotation, indexing and annotation-based retrieval of images. The new method, that we call Markovian Semantic Indexing (MSI), is presented in the context of an online image retrieval system. Assuming such a system, the users’ queries are used to construct an Aggregate…
Mitigation of Lower Order Harmonics in a Grid-Connected Single-Phase PV Inverter Abstract?A simple single-phase grid-connected photovoltaic (PV) inverter topology consisting of a boost section, a low-voltage single-phase inverter with an inductive filter, and a step-up transformer interfacing the grid is considered. Ideally, this topology will not inject any lower order harmonics into the grid…
Mobile recharge system Abstract?presents a Firefox OS app that can be used for suggesting an optimized prepaid plan available for recharging mobile phones according to the plans provided by the service providers. The salient feature of this application when installed on a Firefox OS phone is that it monitors and keeps track of the…
Multi Factor Authentication : Privacy Preserving System Abstract? Continuous re-authentication of users is a must to protect connections with long duration against any malicious activity. Users can be re-authenticated in numerous ways. One popular way is an approach that requires the presentation of two or more authentication factors (i.e., knowledge, possession, identity) called Multi-factor authentication…
Multiclass Brain Tumor Classification using GA-SVM Abstract?The objective of this study is to develop a CAD system for assisting radiologists in multiclass classification of brain tumors. A new hybrid machine learning system based on the Genetic Algorithm (GA) and Support Vector Machine (SVM) for brain tumor classification is proposed. Texture and intensity features of…
Multimodal Biometric system Fusion Using Fingerprint and Iris with Fuzzy Logic Abstract?Biometrics is the ID of humans utilizing intrinsic physical, biological, otherwise activity features, traits, or habits. Biometrics has the potential to provide this desired ability to clearly and discretely determine a person’s identity with additional accuracy and security. Biometric systems primarily based on…