Multiparty Access Control for Online Social Networks: Model and Mechanisms Abstract? Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractive means for digital social interactions and information sharing, but also raise a number of security…
Multiple Target Localization Using Wideband Echo Chirp Signals Abstract?Active target detection and localization is a classical signal processing problem that arises in various military and biomedical applications. A novel method for the detection and estimation of the range, velocity and direction of arrival (DOA) of multiple far-field targets using wideband chirp signals is proposed…
New chaotic encryption algorithm based on chaotic sequence and plain text Abstract?A new chaotic encryption algorithm is proposed. Its key is based on chaotic sequence and plain text. First, the chaotic sequence and the plain text are used; the result is the key, so even someone obtains the initial value he cannot decrypt the…
Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage Abstract?A novel way to reduce noise introduced or exacerbated by image enhancement methods, in particular algorithms based on the random spray sampling technique, but not only. According to the nature of sprays, output images of spray-based methods tend to exhibit noise with unknown statistical…
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK Abstract? Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection…
Object-Level Image Segmentation Using low level cues Abstract? the problem of automatically segmenting an image into a small number of regions that correspond to objects conveying semantics or high-level structure. Although such object-level segmentation usually requires additional high-level knowledge or learning process, we explore what low level cues can produce for this purpose. Our…
Offline signature Abstract? Signature verification is widely used for personal verification. But, it has an inevitable problem of getting exploited for forgery therefore an automatic signature recognition and verification system is required. Verification can be accomplished either Online or Offline based application. Offline systems work on the scanned image of a signature. Online systems use…
On the Security of End-to-End Measurements Based on Packet-Pair Dispersions sequence and plain text Abstract? The packet-pair technique is a widely adopted method to estimate the capacity of a path. The use of the packet-pair technique has been suggested in numerous applications including network management and end-to-end admission control. Recent observations also indicate that…
On-line fast palmprint identification based on adaptive lifting wavelet scheme Abstract? The computation time of classical wavelet transform which based on frequent field is too long to meet the demand of real-time control for roller eccentricity. A novel wavelet based on lifting scheme is proposed for decomposing and dealing with eccentricity signal at the different…
On-line surface roughness recognition system using artificial neural networks system in turning operations Abstract? In modern manufacturing environments, the quality assurance of machined parts has attracted great attention from manufacturers. The surface roughness of a workpiece is one of the most important factors to consider. The need for developing a surface recognition system that…
< Final Year Project > oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks Abstract?Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users’ passwords are prone to be stolen and compromised under different threats and vulnerabilities. Firstly, users often select…