Segmentation of Underwater Images Using Different Techniques Abstract? Segmentation of Underwater Images Using Different Techniques. This paper presents a method for the automatic creation of 2D mosaics of the sea floor, using video sequences acquired at different altitudes above the sea floor. The benefit of using different altitude sequences comes from the fact that higher…
Segmentation-Based Image Copy-Move Forgery Detection Scheme Abstract? Segmentation-Based Image Copy-Move Forgery Detection Scheme. A scheme to detect the copy-move forgery in an image, mainly by extracting the keypoints for comparison. The main difference to the traditional methods is that the proposed scheme first segments the test image into semantically independent patches prior to < Final…
SeLeCT: Self-Learning Classifier for Internet Traffic Abstract?Network visibility is a critical part of traffic engineering, network management, and security. The most popular current solutions – Deep Packet Inspection (DPI) and statistical classification, deeply rely on the availability of a training set. Besides the cumbersome need to regularly update the signatures, their visibility is limited to…
Selected Vehicle Tracking Abstract?Selected Vehicle Tracking, Proportional Integral Derivative (PID) controller is a conventional controller, which is widely used in industrial control system. In this paper, a PID control system is used for path tracking of an autonomous surface vehicle (ASV). The PID controller is selected because it is easy to implement as an embedded…
Self-Adaptive Learning PSO-Based Deadline Abstract?Public clouds provide Infrastructure as a Service (IaaS) to users who do not own sufficient compute resources. IaaS achieves the economy of scale by multiplexing, and therefore faces the challenge of scheduling tasks to meet the peak demand while preserving Quality-of-Service (QoS). Previous studies proposed proactive machine purchasing or cloud federation…
Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters Abstract? Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters. The MapReduce framework and its open source implementation Hadoop have become the defacto platform for scalable analysis on large data sets in recent years. One of the primary concerns in Hadoop is how to minimize the…
Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks Abstract?Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…
Self-Supervised Online Metric Learning With Low Rank Constraint for Scene Categorization Abstract?Conventional visual recognition systems usually train an image classifier in a bath mode with all training data provided in advance. However, in many practical applications, only a small amount of training samples are available in the beginning and many more would come sequentially…
Semantic Features Selection and Representation for Facial Image Retrieval System Abstract? Most image retrieval methods are specialized for image based matching and retrieval based on low-level features. However, humans perceive facial images and compare their similarities using high-level features, such as the description and ranking of facial traits including gender, race, and age. In…
Semantic Link Network-Based Model for Organizing Multimedia Big Data Abstract?Semantic Link Network-Based Model for Organizing Multimedia Big Data. Recent research shows that multimedia resources in the wild are growing at a staggering rate. The rapid increase number of multimedia resources has brought an urgent need to < Final Year Projects > develop intelligent methods to…
Semantic security against web application attacks Abstract? Semantic security against web application attacks. Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. This paper focuses on internal timing attacks, a particularly dangerous class of timing attacks,…
Semantic Web Service Discovery Using Natural Language Processing Techniques Abstract? the proliferation of available Web services, new approaches are needed to search for the most appropriate services matching user requirements. Existing UDDI based discovery techniques fail to recognize similarities and differences between Web service capabilities and thus greatly limit the scope of service discovery. Hence,…