Robust Document Image Binarization Technique for Degraded Document Images Abstract?Segmentation of text from badly degraded document images is a very challenging task due to the high inter/intra-variation between the document background and the foreground text of different document images. In this paper, we propose a novel document image binarization technique that addresses these issues by…
Robust module based Data Management System Abstract? The current trend for building an ontology-based data management system (DMS) is to capitalize on efforts made to design a preexisting well-established DMS (a reference system).< Final Year Project > The method amounts to extracting from the reference DMS a piece of schema relevant to the new application…
Robust Part-Based Hand Gesture Recognition Using Kinect Sensor Abstract? The recently developed depth sensors, e.g., the Kinect sensor, have provided new opportunities for human-computer interaction (HCI). Although great progress has been made by leveraging the Kinect sensor, e.g., in human body tracking, face recognition and human action recognition, robust hand gesture recognition remains an open…
Robust Perceptual Image Hashing Based on Ring Partition and NMF Abstract?designs an efficient image hashing with a ring partition and a nonnegative matrix factorization (NMF), which has both the rotation robustness and good discriminative capability. The key contribution is a novel construction of rotation-invariant secondary image, which is used for the first time in image…
Robust Perceptual Image Hashing Based on Ring Partition and NMF Abstract? designs an efficient image hashing with a ring partition and a nonnegative matrix factorization (NMF), which has both the rotation robustness and good discriminative capability. The key contribution is a novel construction of rotation-invariant secondary image, which is used for the first time in…
Robust Radial Face Detection for Omnidirectional Vision Abstract?Bio-inspired and non-conventional vision systems are highly researched topics. Among them, omnidirectional vision systems have demonstrated their ability to significantly improve the geometrical interpretation of scenes. However, few researchers have investigated how to perform object detection with such systems.< Final Year Project > The existing approaches require a…
Robust Segments Detector for De-Synchronization Resilient Audio Watermarking Abstract? A robust feature points detector for invariant audio watermarking is proposed in this paper. The audio segments centering at the detected feature points are extracted for both watermark embedding and extraction. These feature points are invariant to various attacks and will not be changed much for…
Robust Watermarking of Compressed and Encrypted JPEG2000 Images Abstract?Digital asset management system (DAMS) handles digital assets. For ownership declaration or copyright management, DAMS need to watermark the digital assets. For more efficiency and protection, it is necessary to watermark the digital assets in the compressed-encrypted domain. In compression process, encoding information using fewer bits than…
Safe city for using gps and camera Abstract? Safe city for using gps and camera. Vehicle geo-localization in urban areas remains to be challenging problems. For this purpose, Global Positioning System (GPS) receiver is usually the main sensor. But, the use of GPS alone is not sufficient in many urban environments due to wave multi-path….
Safe Driving Using Mobile Phones Abstract? Safe Driving Using Mobile Phones. As vehicle manufacturers continue to increase their emphasis on safety with advanced driver-assistance systems (ADASs), we propose a device that is not only already in abundance but portable enough as well to be one of the most effective multipurpose devices that are able to…
SafeStack: Automatically Patching Stack- Based Buffer Overflow Vulnerabilities Abstract? Buffer overflow attacks still pose a significant threat to the security and availability of today’s computer systems. Although there are a number of solutions proposed to provide adequate protection against buffer overflow attacks, most of existing solutions terminate the vulnerable program when the buffer overflow occurs,…
SanGA: A Self-Adaptive Network-Aware Approach to Service Composition Abstract?SanGA: A Self-Adaptive Network-Aware Approach to Service Composition. Service-Oriented Computing enables the composition of loosely coupled services provided with varying Quality of Service (QoS) levels. Selecting a near-optimal set of services for a composition in terms of QoS is crucial when many functionally equivalent services are available….