Segmentation-Based Image Copy-Move Forgery Detection Scheme Abstract? Segmentation-Based Image Copy-Move Forgery Detection Scheme. A scheme to detect the copy-move forgery in an image, mainly by extracting the keypoints for comparison. The main difference to the traditional methods is that the proposed scheme first segments the test image into semantically independent patches prior to < Final…
Segmenting Retinal Blood Vessels with Deep Neural Networks Abstract?The condition of the vascular network of human eye is an important diagnostic factor in ophthalmology. Its segmentation in fundus imaging is a nontrivial task due to variable size of vessels, relatively low contrast, and potential presence of pathologies like microaneurysms and hemorrhages.< final year projects >…
SeLeCT: Self-Learning Classifier for Internet Traffic Abstract?Network visibility is a critical part of traffic engineering, network management, and security. The most popular current solutions – Deep Packet Inspection (DPI) and statistical classification, deeply rely on the availability of a training set. Besides the cumbersome need to regularly update the signatures, their visibility is limited to…
Selected Vehicle Tracking Abstract?Selected Vehicle Tracking, Proportional Integral Derivative (PID) controller is a conventional controller, which is widely used in industrial control system. In this paper, a PID control system is used for path tracking of an autonomous surface vehicle (ASV). The PID controller is selected because it is easy to implement as an embedded…
Self Security Through GPS Based Protection System Abstract? Self-security through GPS based protection system is a security application which is specially designed for mobile users especially for women. This application offers a helping hand with the help of GPS based location tracing. At the time of emergency there may not be any possibility to attempt…
Self-Adaptive Learning PSO-Based Deadline Abstract?Public clouds provide Infrastructure as a Service (IaaS) to users who do not own sufficient compute resources. IaaS achieves the economy of scale by multiplexing, and therefore faces the challenge of scheduling tasks to meet the peak demand while preserving Quality-of-Service (QoS). Previous studies proposed proactive machine purchasing or cloud federation…
Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters Abstract? Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters. The MapReduce framework and its open source implementation Hadoop have become the defacto platform for scalable analysis on large data sets in recent years. One of the primary concerns in Hadoop is how to minimize the…
Self-Deployment of Mobile Sensors to Achieve Target Coverage in the Presence of Obstacles Abstract? Target coverage is one of the major requirements in wireless sensor network applications, the purpose of which is to monitor a set of known targets in the region of interest. In this paper, we propose a localized self-deployment scheme, named as…
Self-Deployment of Randomly Scattered Mobile Sensors to Achieve Barrier Coverage Abstract? Constructing sensor barrier is a critical issue in wireless sensor networks for military and homeland security applications, which aims to detect intruders crossing into a protected area. In this letter, we propose two distributed, localized deployment schemes for self-adjustment of randomly deployed mobile sensor…
Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks Abstract?Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…
Self-Supervised Online Metric Learning With Low Rank Constraint for Scene Categorization Abstract?Conventional visual recognition systems usually train an image classifier in a bath mode with all training data provided in advance. However, in many practical applications, only a small amount of training samples are available in the beginning and many more would come sequentially…
Semantic Features Selection and Representation for Facial Image Retrieval System Abstract? Most image retrieval methods are specialized for image based matching and retrieval based on low-level features. However, humans perceive facial images and compare their similarities using high-level features, such as the description and ranking of facial traits including gender, race, and age. In…