Friday, 26 April 2013

Content-Based Microscopic Image Retrieval System for Multi-Image Queries

Content-Based Microscopic Image Retrieval System for Multi-Image Queries

Abstract:-
In this paper, we describe the design and development of a multitiered content-based image retrieval (CBIR) system for microscopic images utilizing a reference database that contains images of more than one disease. The proposed CBIR system uses a multitiered approach to classify and retrieve microscopic images involving their specific subtypes, which are mostly difficult to discriminate and classify. This system enables both multi-image query and slide-level image retrieval in order to protect the semantic consistency among the retrieved images. New weighting terms, inspired from information retrieval theory, are defined for multiple-image query and retrieval. The performance of the system was tested on a dataset including 1666 imaged high power fields extracted from 57 follicular lymphoma (FL) tissue slides with three subtypes and 44 neuroblastoma (NB) tissue slides with four subtypes. Each slide is semantically annotated according to their subtypes by expert pathologists. By using leave-one-slide out testing scheme, the multi-image query algorithm with the proposed weighting strategy achieves about 93% and 86% of average classification accuracy at the first rank retrieval, outperforming the image-level retrieval accuracy by about 38 and 26 percentage points, for FL and NB diseases, respectively.

Language : Matlab
Domain   : Image Processing
Contact  : 04652 - 402011
Price      :12,000/-
Email ID : Contact@nanosoftwares.com

Thursday, 25 April 2013

Leakage Current Reduction in a Single-Phase Bidirectional AC–DC Full-Bridge Inverter

Leakage Current Reduction in a Single-Phase Bidirectional AC–DC Full-Bridge Inverter

Abstract:-
The leakage current in grid-interface converter systems presents a considerable issue in regard to safety and efficiency. The full-bridge inverter is a well-accepted topology in single-phase power conversion applications. The high-frequency pulse width modulation (PWM) modulation schemes are normally applied to the full-bridge topology for smaller ac filter size, which, however, generates a high-frequency dc-side leakage current, resulting in an enormous negative impact on dc components, such as photovoltaic panels and energy storage elements. In this paper, a modified full-bridge inverter topology to reduce the dc-side leakage current as well as to mitigate the ac-side common-mode electromagnetic interference noise is presented. Several considerations are discussed, such as the PWM modulation and filter design. Compared to the other existing methods, the proposed solution provides a reliable performance for bidirectional operation,minimum
additional components, low cost, and a simple design process.

Language : Matlab
Domain    : Power electronics converted 
Contact    : 04652 - 402011
Price        :  12,000/-
E-mail.ID : Contact@nanosoftwares.com

Wednesday, 24 April 2013

Congestion Aware Media Independent Handover

Abstract:-

congestion aware media independent handover

Language : Matlab
 Domain  : Wireless sensor 

Thursday, 24 January 2013

FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks


Distributed denial-of-service (DDoS) attacks remain a major security problem, the mitigation of which is very hard especially when it comes to highly distributed botnet-based attacks. The early discovery of these attacks, although challenging, is necessary to protect end-users as well as the expensive network infra-structure resources. In this paper, we address the problem of DDoS attacks and present the theoretical foundation, architecture, and algorithms of FireCol. The core of FireCol is composed of intrusion prevention systems (IPSs) locatedat the Internet service providers (ISPs) level. The IPSs form virtual protection rings around the hosts to defend and collaborate by exchanging selected trafficin-formation. The evaluation ofFireColusing extensive simulations and a real dataset is presented, showingFireColeffectiveness and low overhead, as well as its support for incremental deployment in real networks

Language : JAVA
Domain   :  Network Security
Contact  : 04652 -402011
Price    : 12,000/-
Email    : contact@nanosoftwares.com

Wednesday, 23 January 2013

A Secure Single Sign-On Mechanism for Distributed Computer Networks


User identification is an important access control mechanism for client–server networking architectures. The con-cept of single sign-on can allow legal users to use the unitary token to access different service providers in distributed computer networks. Recently, some user identification schemes have been proposed for distributed computer networks. Unfortunately, most existing schemes cannot preserve user anonymity when possible attacks occur. Also, the additional time-synchronized mechanisms they use may cause extensive overhead costs. To overcome these drawbacks, we propose a secure single sign-on mechanism that is efficient, secure, and suitable for mobile devices in distributed computer networks.

Language : JAVA
Domain    : Data Mining
Contact    : 04652 -402011
Price        : 12,000/-
Email       : contact@nanosoftwares.com

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance, MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a MANET is independently free to move in any direction, and will therefore change its connections to other devices frequently. So one of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. Ad hoc also contains wireless sensor network so the problems is facing by sensor network is also faced by MANET. While developing the sensor nodes in unattended environment increases the chances of various attacks. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main aim is seeing the effect of DDoS in routing load, packet drop rate, end to end delay, i.e. maximizing due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this paper we discussed some attacks on MANET and DDOS also and provide the security against the DDOS attack.

Language :JAVA
Domain    : Network Security 
Contact    : 04652 -402011
Price        : 12,000/-
Email       : contact@nanosoftwares.com

Friday, 18 January 2013

View-invariant action recognition based on Artificial Neural Networks




In this paper, a novel view invariant action recognition method based on neural network representation and recognition is proposed. The novel representation of action videos is based on learning spatially related human body posture prototypes using Self Organizing Maps (SOM). Fuzzy distances from human body posture prototypes are used to produce a time invariant action representation. Multilayer perceptrons are used for action classification. The algorithm is trained using data from a multi-camera setup. An arbitrary number of cameras can be used in order to recognize actions using a Bayesian framework. The proposed method can also be applied to videos depicting interactions between humans, without any modification. The use of information captured from different viewing angles leads to high classification performance. The proposed method is the first one that has been tested in challenging experimental setups, a fact that denotes its effectiveness to deal with most of the open issues in action recognition.

Language : Matlab
Domain    : Image Processing
Contact    : 04652 -402011
Price        : 12,000/-
Email       : contact@nanosoftwares.com

Thursday, 17 January 2013

Publishing Search Logs—A Comparative Study of Privacy Guarantees

Search engine companies collect the “database of intentions,” the histories of their users' search queries. These search logs are a gold mine for researchers. Search engine companies, however, are wary of publishing search logs in order not to disclose sensitive information. In this paper, we analyze algorithms for publishing frequent keywords, queries, and clicks of a search log. We first show how methods that achieve variants of k-anonymity are vulnerable to active attacks. We then demonstrate that the stronger guarantee ensured by ε-differential privacy unfortunately does not provide any utility for this problem. We then propose an algorithm ZEALOUS and show how to set its parameters to achieve (ε, δ)-probabilistic privacy. We also contrast our analysis of ZEALOUS with an analysis by Korolova et al. [17] that achieves (ε',δ')-indistinguishability. Our paper concludes with a large experimental study using real applications where we compare ZEALOUS and previous work that achieves k-anonymity in search log publishing. Our results show that ZEALOUS yields comparable utility to k-anonymity while at the same time achieving much stronger privacy guarantees.


Language : Java
Domain    : Data Mining
Contact    : 04652-402011 
Price        : 12,000/- 
Email       : contact@nanosoftwares.com 

Saturday, 12 January 2013

Vehicle detection in aerial surveillance using dynamic Bayesian network

We present an automatic vehicle detection system for aerial surveillance in this paper. In this system, we escape from the stereotype and existing frameworks of vehicle detection in aerial surveillance, which are either region based or sliding window based. We design a pixelwise classification method for vehicle detection. The novelty lies in the fact that, in spite of performing pixelwise classification, relations among neighboring pixels in a region are preserved in the feature extraction process. We consider features including vehicle colors and local features. For vehicle color extraction, we utilize a color transform to separate vehicle colors and nonvehicle colors effectively. For edge detection, we apply moment preserving to adjust the thresholds of the Canny edge detector automatically, which increases the adaptability and the accuracy for detection in various aerial images. Afterward, a dynamic Bayesian network (DBN) is constructed for the classification purpose. We convert regional local features into quantitative observations that can be referenced when applying pixelwise classification via DBN. Experiments were conducted on a wide variety of aerial videos. The results demonstrate flexibility and good generalization abilities of the proposed method on a challenging data set with aerial surveillance images taken at different heights and under different camera angles.




Language : Matlab
Domain : Image Processing
Contact  : 04652-402011.
Price : 12000/-
Email : contact@nanosoftwares.com