A Protocol for Evaluating Video Trackers Under Real-World Conditions Abstract?The absence of a commonly adopted performance evaluation framework is hampering advances in the design of effective video trackers. < Final Year Projects > In this paper, we present a single-score evaluation measure and a protocol to objectively compare trackers. The proposed measure evaluates tracking accuracy…
A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments Abstract? Caching valid regions of spatial queries at mobile clients is effective in reducing the number of queries submitted by mobile clients and query load on the server. However, mobile clients suffer from longer waiting time for the server to compute valid regions. We…
A Research of Feature-based Image Mosaic Algorithm Abstract?Due to the stitching precision and speed of existing image mosaicing technique, this paper summarizes three common based on Feature matching algorithm: Harris corner detection algorithm, SIFT (Scale Invariant Feature Transform) algorithm, SURF ( Speeded-Up Robust Features ) algorithm. This paper describes the principle of three algorithm respectively….
A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments Abstract?Approximations of a concept by a variable precision rough-set model (VPRS) usually vary under a dynamic information system environment. It is thus effective to carry out incremental updating approximations by utilizing previous data structures.< Final Year Project > This paper focuses on a new…
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability Abstract? A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An…
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Abstract? A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.a secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will…
A Secured Authentication System for MANETs using voice and Fingerprint Biometrics Abstract?Mobile Adhoc NETworks (MANET) are collections of wireless mobile devices with restricted broadcast range and resources and communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. MANET is a self configuring, dynamic, multi…
A Security Modeling Approach forWeb-Service-based Business Processes. Several reports indicate that the highest business priorities include: business improvement, security, and IT management. The importance of security and risk management is gaining that even government statements in some cases have imposed the inclusion of security and risk management within business management. Risk assessment has become an…
A Segmentation and Graph-based Sequence Matching Method for Video Copy Detection Abstract? We propose in this paper a segmentation and graph-based video sequence matching method for video copy detection. Specifically, due to the good stability and discriminative ability of local features, we use SIFT descriptor for video content description. However, matching based on SIFT descriptor…
A SIFT-based forensic method for copy-move attack detection and transformation recovery Abstract?One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law.< Final Year...
A Statistical Modeling Approach for Tumor-Type Identification in Surgical Neuropathology Using Tissue Mass Spectrometry Imaging Abstract?Current clinical practice involves classification of biopsied or resected tumor tissue based on a histopathological evaluation by a neuropathologist. In this paper, we propose a method for computer-aided histopathological evaluation using mass spectrometry imaging. Specifically, mass spectrometry imaging can be…
A Suitable Initialization Procedure for Speeding a Neural Network Job-Shop Scheduling Abstract? Artificial neural network models have been successfully applied to solve a job-shop scheduling problem (JSSP) known as a Nonpolynomial (NP-complete) constraint satisfaction problem. Our main contribution is an improvement of the algorithm proposed in the literature. It consists in using a procedure optimizing…