Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model Abstract?Recent increase in the use of video-based applications has revealed the need for extracting the content in videos. Raw data and low-level features alone are not sufficient to fulfill the user ‘s needs; that is, a deeper understanding of the content…
Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study Abstract? Applications of cyber technologies improve the quality of monitoring and decision making in smart grid. These cyber technologies are vulnerable to malicious attacks, and compromising them can have serious technical and economical problems.< Final Year Project > This paper specifies the…
Biomedical Document Clustering Using Ontology based Concept Weight Abstract?Conventional document clustering techniques are mainly based on the existence of keywords and the number of occurrences of it. Most of the term frequency based clustering techniques consider the documents as bag-of-words and ignore the important relationships between the words in the document. Phrase based clustering…
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Abstract? Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. < Final Year Project > Unfortunately, it also…
cashing in on cloud cache Service Abstract? Over the past decades, caching has become the key technology used for bridging the performance gap across memory hierarchies via temporal or spatial localities; in particular, the effect is prominent in disk storage systems. Applications that involve heavy I/O activities, which are common in the cloud, probably benefit…
CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks Abstract? wireless sensor networks, data aggregation scheme that reduces a large amount of transmission is the most practical technique. In previous studies, homomorphic encryptions have been applied to conceal communication during aggregation such that enciphered data can be aggregated algebraically without decryption….
Classification of EEG signal using wavelet pocket, GA, RBF Abstract?we propose new features based on multiwavelet transform for classification of human emotions from electroencephalogram (EEG) signals. The EEG signal measures electrical activity of the brain, which contains lot of information related to emotional states.< Final Year Project > The sub-signals obtained by multiwavelet decomposition…
Classification of Simultaneous Movements Using Surface EMG Pattern Recognition Abstract?Advanced upper limb prostheses capable of actuating multiple degrees of freedom (DOFs) are now commercially available. Pattern recognition algorithms that use surface electromyography (EMG) signals show great promise as multi-DOF controllers. Unfortunately, current pattern recognition systems are limited to activate only one DOF at a…
Cloud Task scheduling based on Load Balancing Ant Colony Optimiza Abstract?The cloud computing is the development of distributed computing, parallel computing and grid computing, or defined as the commercial implementation of these computer science concepts. One of the fundamental issues in this environment is related to task scheduling.< Final Year Project > Cloud task…
Co-Occurrence based Diffusion for expert search on the web Abstract? Expert search has been studied in different contexts, e.g., enterprises, academic communities. We examine a general expert search problem: searching experts on the web, where millions of webpages and thousands of names are considered. It has mainly two challenging issues: 1) webpages could be…
Community-Aware Opportunistic Routing in Mobile Social Networks Abstract?Mobile social networks (MSNs) are a kind of delay tolerant network that consists of lots of mobile nodes with social characteristics. Recently, many social-aware algorithms have been proposed to address routing problems in MSNs. However, these algorithms tend to forward messages to the nodes with locally optimal social…