A Statistical Modeling Approach for Tumor-Type Identification in Surgical Neuropathology Using Tissue Mass Spectrometry Imaging Abstract?Current clinical practice involves classification of biopsied or resected tumor tissue based on a histopathological evaluation by a neuropathologist. In this paper, we propose a method for computer-aided histopathological evaluation using mass spectrometry imaging. Specifically, mass spectrometry imaging can be…
A Suitable Initialization Procedure for Speeding a Neural Network Job-Shop Scheduling Abstract? Artificial neural network models have been successfully applied to solve a job-shop scheduling problem (JSSP) known as a Nonpolynomial (NP-complete) constraint satisfaction problem. Our main contribution is an improvement of the algorithm proposed in the literature. It consists in using a procedure optimizing…
A System to Filter Unwanted Messages from OSN User Walls Abstract? One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide little support to this requirement. < Final...
A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless Cellular Networks Abstract?Multicast/broadcast is regarded as an efficient technique for wireless cellular networks to transmit a large volume of common data to multiple mobile users simultaneously. To guarantee the quality of service for each mobile user in such single-hop multicasting, the base-station transmitter…
Accurate Analysis of Double-Weight Codes with an Arbitrary Maximum Cross-Correlation Value for Two-Chip-Power Optical CDMA Abstract? Due to power restriction of some laser sources, the use of same power (per bit duration) in optical codes in incoherent optical code-division multiple-access multimedia networks with variable quality-of-services was previously studied. < Final Year Projects >In those studies,…
Age and pose Invarient feature extraction for Robust face Recognation Abstract? Automatic face recognition system has been facing problems in recognizing subjects of varying ages. Age invariant recognition has been of great use in tracking people database especially in public domain systems like driving license,< Final Year Project > passport, and criminal records etc., this…
Algorithms for a parallel implementation of Hidden Markov Models with a small state space Abstract?Two of the most important algorithms for Hidden Markov Models are the forward and the Viterbi algorithms. We show how formulating these using linear algebra naturally lends itself to parallelization.< Final Year Project > Although the obtained algorithms are slow for…
An Adaptive System Based on Roadmap Profiling to Enhance Warning Message Dissemination in VANETs Abstract? In recent years, new applications, architectures, and technologies have been proposed for vehicular ad hoc networks (VANETs). Regarding traffic safety applications for VANETs, warning messages have to be quickly and smartly disseminated in order to reduce the required dissemination time…
An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks Abstract?Address assignment is a key challenge in ad hoc networks due to the lack of infrastructure.< Final Year Project > Autonomous addressing protocols require a distributed and self-managed mechanism to avoid address collisions in a dynamic network with fading channels, frequent partitions,…
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing Abstract? In cloud computing, data owners host their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, this new paradigm of data hosting service also introduces new security challenges, which…
An efficient Multiple Object Detection and tracking framework for automatic counting and video surveillance application Abstract?Automatic visual object counting and video surveillance have important applications for home and business environments, such as security and management of access points. However, in order to obtain a satisfactory performance these technologies need professional and expensive hardware, complex installations…
An Embedded Real-Time Finger-Vein Recognition System for Mobile Devices Abstract?The development of consumer electronics, the demand for simple, convenient, and high-security authentication systems for protecting private information stored in mobile devices has steadily increased. In consideration of emerging requirements for information protection, biometrics, which uses human physiological or behavioral features for personal identification, has been…