Tag Completion for Image Retrieval Abstract?Many social image search engines are based on keyword/tag matching. This is because tag-based image retrieval (TBIR) is not only efficient but also effective. The performance of TBIR is highly dependent on the availability and quality of manual tags. Recent studies have shown that manual tags are often unreliable and…
tamil ontology Abstract?Ontology plays a vital role in teaching and learning. In the last decade most of the learning sites were trying to adopt semantic web techniques to develop the learning materials.< Final Year Projects > It is easy to visualize the concepts that are developed in ontology in an effective manner. In this article…
Texture Classification Using Rotation- and Scale-Invariant Gabor Texture Features Abstract? This letter introduces a novel approach to rotation and scale invariant texture classification. The proposed approach is based on Gabor filters that have the capability to collapse the filter responses according to the scale and orientation of the textures. These characteristics are exploited to first…
Texture Enhanced Histogram Equalization Using TV-L1 Image Decomposition Abstract?Histogram transformation defines a class of image processing operations that are widely applied in the implementation of data normalization algorithms. In this paper, we present a new variational approach for image enhancement that is constructed to alleviate the intensity saturation effects that are introduced by standard contrast…
Toward SWSs Discovery: Mapping fromWSDL to OWL-S Based on OntologySearch and Standardization Engine Abstract? Semantic Web Services (SWSs) represent the most recent and revolutionary technology developed for machine-to-machine interaction on the web 3.0. As for the conventional web services, the problem of discovering and selecting the most suitable web service represents a challenge for SWSs…
Toward Ubiquitous Healthcare Services With a Novel Efficient Cloud Platform Abstract? Ubiquitous healthcare services are becoming more and more popular, especially under the urgent demand of the global aging issue. Cloud computing owns the pervasive and on-demand service-oriented natures, which can fit the characteristics of healthcare services very well. However, the abilities in dealing with…
Towards Differential Query Services in Cost-Efficient Clouds Abstract?Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs.< Final Year Projects > In this paper, we address…
Towards the Scheduling of Access Requests In Cloud Storage Abstract?In recent years, cloud computing has emerged as an enabling technology, in which virtual machine migration and dynamic resource allocation is one of the hot issues. During the migration of virtual machine, access requests from end users coming constantly. So how to schedule these requests to…
TREE-METRICS GRAPH CUTS FOR BRAIN MRI SEGMENTATION WITH TREE CUTTING Abstract?We tackle the problem of brain MRI image segmentation using the tree-metric graph cuts (TM) algorithm, a novel image segmentation algorithm, and introduce a ?tree-cutting? method to interpret the labeling returned by the TM algorithm as tissue classification for the input brain MRI image. The…
Two cooperative ant colonies for feature selection using fuzzy models Abstract? The available set of potential features in real-world databases is sometimes very large,< Final Year Projects > and it can be necessary to find a small subset for classification purposes. One of the most important techniques in data pre-processing for classification is feature selection….
ubiSOAP A Service Oriented Middleware for Ubiquitous Networking. Abstract? The computing and networking capacities of today’s wireless portable devices allow for ubiquitous services, which are seamlessly networked. Indeed, wireless handheld devices now embed the necessary resources to act as both service clients and providers.< Final Year Projects > However, the ubiquitous networking of services remains…
Unprivileged Black-Box Detection of User-Space Keyloggers Abstract?Software keyloggers are a fast growing class of invasive software often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unprivileged programs running in user space to eavesdrop and record all the keystrokes typed by the users of a system.<...