Two cooperative ant colonies for feature selection using fuzzy models Abstract? The available set of potential features in real-world databases is sometimes very large,< Final Year Projects > and it can be necessary to find a small subset for classification purposes. One of the most important techniques in data pre-processing for classification is feature selection….
U-Skyline: A New Skyline Query for Uncertain Databases Abstract? U-Skyline: A New Skyline Query for Uncertain Databases.U-Skyline: A New Skyline Query for Uncertain Databases The skyline query, aiming at identifying a set of skyline tuples that are not dominated by any other tuple, is particularly useful for multicriteria data analysis and decision making. For uncertain…
ubiSOAP A Service Oriented Middleware for Ubiquitous Networking. Abstract? The computing and networking capacities of today’s wireless portable devices allow for ubiquitous services, which are seamlessly networked. Indeed, wireless handheld devices now embed the necessary resources to act as both service clients and providers.< Final Year Projects > However, the ubiquitous networking of services remains…
Unprivileged Black-Box Detection of User-Space Keyloggers Abstract?Software keyloggers are a fast growing class of invasive software often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unprivileged programs running in user space to eavesdrop and record all the keystrokes typed by the users of a system.<...
Unsupervised Colour Image Segmentation using Dual-tree Complex Wavelet Transform Abstract?a novel image segmentation technique for noisy colour images, in which the heavy-tailed characteristics of the image are modelled by Cauchy distributions. First, the RGB colour bands of the noisy image are decomposed into multiresolution representations using the dual-tree complex wavelet transform.< Final Year Project >…
Unsupervised traffic classification using flow statistical properties and IP packet payload. The researchers have started looking for Internet traffic recognition techniques that are independent of `well known’ TCP or UDP port numbers or interpreting the contents of packet payloads. Newer approaches classify traffic by recognizing statistical patterns in externally observable attributes of the traffic (such…
Using Dependency Structures for Prioritization of Functional Test Suites Abstract?Test case prioritization is the process of ordering the execution of test cases to achieve a certain goal, such as increasing the rate of fault detection. Increasing the rate of fault detection can provide earlier feedback to system developers, improving fault fixing activity and, ultimately,…
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds Abstract?Recent research has provided evidence indicating how a malicious user could perform coresidence profiling and public-to-private IP mapping to target and exploit customers which share physical resources. The attacks rely on two steps: resource placement on the target?s physical machine and…
Vertical-Edge-Based Car-License-Plate Detection Method Abstract?proposes a fast method for car-license-plate detection (CLPD) and presents three main contributions. The first contribution is that we propose a fast vertical edge detection algorithm (VEDA) based on the contrast between the grayscale values< Final Year Projects >, which enhances the speed of the CLPD method. After binarizing the…
ViDE: A Vision-Based Approach for Deep Web Data Extraction Abstract? Deep Web contents are accessed by queries submitted to Web databases and the returned data records are enwrapped in dynamically generated Web pages (they will be called deep Web pages in this paper). Extracting structured data from deep Web pages is a challenging problem…
Video Inpainting Abstract? A framework for inpainting missing parts of a video sequence is presented. The first step in the algorithm consists of finding the geometrical flow of each frame in the video sequence by using the Bandelet transform. < Final Year Projects >Consequently, each frame is segmented into a quadtree where each dyadic…