A SIFT-based forensic method for copy-move attack detection and transformation recovery Abstract?One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law.< Final Year...
A Statistical Modeling Approach for Tumor-Type Identification in Surgical Neuropathology Using Tissue Mass Spectrometry Imaging Abstract?Current clinical practice involves classification of biopsied or resected tumor tissue based on a histopathological evaluation by a neuropathologist. In this paper, we propose a method for computer-aided histopathological evaluation using mass spectrometry imaging. Specifically, mass spectrometry imaging can be…
A Suitable Initialization Procedure for Speeding a Neural Network Job-Shop Scheduling Abstract? Artificial neural network models have been successfully applied to solve a job-shop scheduling problem (JSSP) known as a Nonpolynomial (NP-complete) constraint satisfaction problem. Our main contribution is an improvement of the algorithm proposed in the literature. It consists in using a procedure optimizing…
A System for Timely and Controlled Information Sharing in Emergency Situations Abstract? During natural disasters or emergency situations, an essential requirement for an effective emergency management is the information sharing.< Final Year Projects > In this paper, we present an access control model to enforce controlled information sharing in emergency situations. An in-depth analysis of…
A System to Filter Unwanted Messages from OSN User Walls Abstract? One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide little support to this requirement. < Final...
A Toolkit for Modeling and Simulation of Real-Time Virtual Machine Allocation in a Cloud Data Center Abstract?A Toolkit for Modeling and Simulation of Real-Time Virtual Machine Allocation in a Cloud Data Center. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution…
A Trajectory Privacy-Preserving Framework for Participatory Sensing. The ubiquity of the various cheap embedded sensors on mobile devices, for example cameras, microphones, accelerometers, and so on, is enabling the emergence of participatory sensing applications. While participatory sensing can benefit the individuals and communities greatly, the collection and analysis of the participators’ location and trajectory data…
A Transformerless Grid-Connected Photovoltaic System Based on the Coupled Inductor Single-Stage Boost Three-Phase Inverter Abstract? A Transformerless Grid-Connected Photovoltaic System Based on the Coupled Inductor Single-Stage Boost Three-Phase Inverter. This letter presents a modulation technique for the modified coupled-inductor single-stage boost inverter (CL-SSBI)-based grid-connected photovoltaic (PV) system. This technique can reduce the system leakage current…
A Trigger Identification Service for Defending Reactive Jammers in WSN Abstract?A Trigger Identification Service for Defending Reactive Jammers in WSN. During the last decade, Reactive Jamming Attack has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. Considering…
A Two-Level FH-CDMA Scheme for Wireless Communication Systems over Fading Channels Abstract– A Two-Level FH-CDMA Scheme for Wireless Communication Systems over Fading Channels. In this paper, we propose a “two-level” frequency-hopping code-division multiple-access (FH-CDMA) scheme for wireless communication systems. The new scheme provides flexibility in the selection of modulation codes and FH patterns. By partitioning…
A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless Cellular Networks Abstract?Multicast/broadcast is regarded as an efficient technique for wireless cellular networks to transmit a large volume of common data to multiple mobile users simultaneously. To guarantee the quality of service for each mobile user in such single-hop multicasting, the base-station transmitter…
A Web Search Engine-Based Approach to Measure Semantic Similarity between Words Abstract? A Web Search Engine-Based Approach to Measure Semantic Similarity between Words. Measuring the semantic similarity between words is an important component in various tasks on the web such as relation extraction, community mining, < Final Year Projects > document clustering, and automatic metadata…