A SIFT-based forensic method for copy-move attack detection and transformation recovery Abstract?One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law.< Final Year…
A Statistical Modeling Approach for Tumor-Type Identification in Surgical Neuropathology Using Tissue Mass Spectrometry Imaging Abstract?Current clinical practice involves classification of biopsied or resected tumor tissue based on a histopathological evaluation by a neuropathologist. In this paper, we propose a method for computer-aided histopathological evaluation using mass spectrometry imaging. Specifically, mass spectrometry imaging can…
A Suitable Initialization Procedure for Speeding a Neural Network Job-Shop Scheduling Abstract? Artificial neural network models have been successfully applied to solve a job-shop scheduling problem (JSSP) known as a Nonpolynomial (NP-complete) constraint satisfaction problem. Our main contribution is an improvement of the algorithm proposed in the literature. It consists in using a procedure…
A System for Timely and Controlled Information Sharing in Emergency Situations Abstract? During natural disasters or emergency situations, an essential requirement for an effective emergency management is the information sharing.< Final Year Projects > In this paper, we present an access control model to enforce controlled information sharing in emergency situations. An in-depth analysis of…
A System to Filter Unwanted Messages from OSN User Walls Abstract? One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide little support to this requirement. <…
A Toolkit for Modeling and Simulation of Real-Time Virtual Machine Allocation in a Cloud Data Center Abstract?A Toolkit for Modeling and Simulation of Real-Time Virtual Machine Allocation in a Cloud Data Center. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution…
A Trajectory Privacy-Preserving Framework for Participatory Sensing. The ubiquity of the various cheap embedded sensors on mobile devices, for example cameras, microphones, accelerometers, and so on, is enabling the emergence of participatory sensing applications. While participatory sensing can benefit the individuals and communities greatly, the collection and analysis of the participators’ location and trajectory data…
A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless Cellular Networks Abstract?Multicast/broadcast is regarded as an efficient technique for wireless cellular networks to transmit a large volume of common data to multiple mobile users simultaneously. To guarantee the quality of service for each mobile user in such single-hop multicasting, the base-station transmitter…
Accurate Analysis of Double-Weight Codes with an Arbitrary Maximum Cross-Correlation Value for Two-Chip-Power Optical CDMA Abstract? Due to power restriction of some laser sources, the use of same power (per bit duration) in optical codes in incoherent optical code-division multiple-access multimedia networks with variable quality-of-services was previously studied. < Final Year Projects >In those…
Active Filter-Based Hybrid On-Chip DC?DC Converter for Point-of-Load Voltage Regulation. Experimental results of an active filter based on-chip hybrid voltage converter are described in this paper. The area of the voltage converter is significantly less than the area of a conventional passive filter based DC-DC voltage converter or a low-dropout (LDO) regulator. Hence, the proposed…
Age and pose Invarient feature extraction for Robust face Recognation Abstract? Automatic face recognition system has been facing problems in recognizing subjects of varying ages. Age invariant recognition has been of great use in tracking people database especially in public domain systems like driving license,< Final Year Project > passport, and criminal records etc.,…