Sketch4match Content-based image retrieval system using sketches

Sketch4match Content-based image retrieval system using sketches The content based image retrieval (CBIR) is one of the most popular, rising research areas of the digital image processing. Most of the available image search tools, such as Google Images and Yahoo! Image search, are based on textual annotation of images. In these tools, images are manually annotated with keywords and then retrieved using text-based search methods. The performances of these systems are not satisfactory. The goal of CBIR is to extract visual content of an image automatically, like color, texture, or…

Read More

Privacy Preserving Data Sharing With Anonymous ID Assignment

Privacy Preserving Data Sharing With Anonymous ID Assignment INFORMATION FORENSICS AND SECURITY, FEBRUARY 2013 An algorithm for anonymous sharing of private data among parties is developed. This technique is used iteratively to assign these nodes ID numbers ranging from 1 to . This assignment is anonymous in that the identities received are unknown to the other members of the group. Resistance to collusion among other members is verified in an information theoretic sense when private communication channels are used. This assignment of serial numbers allows more complex data to be…

Read More

Local Directional Number Pattern for Face Analysis: Face and Expression Recognition

Local Directional Number Pattern for Face Analysis: Face and Expression Recognition Technology Used: Dot Net This paper proposes a novel local feature descriptor, local directional number pattern (LDN), for face analysis, i.e., face and expression recognition. LDN encodes the directional information of the face’s textures (i.e., the texture’s structure) in a compact way, producing a more discriminative code than current methods. We compute the structure of each micro-pattern with the aid of a compass mask that extracts directional information, and we encode such information using the prominent direction indices (directional numbers) and…

Read More

Cost-Based Optimization of Service Compositions

Cost-Based Optimization of Service Compositions SERVICES COMPUTING APRIL-JUNE 2013 Technology Used: Dot Net For providers of composite services, preventing cases of SLA violations is crucial. Previous work has established runtime adaptation of compositions as a promising tool to achieve SLA conformance. However, to get a realistic and complete view of the decision process of service providers, the costs of adaptation need to be taken into account. In this paper, we formalize the problem of finding the optimal set of adaptations, which minimizes the total costs arising from SLA violations and…

Read More

A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Technology Used: Dot Net Given the sensitivity of the potential WSN applications and because of resource limitations, key management emerges as a challenging issue for WSNs. One of the main concerns when designing a key management scheme is the network scalability. Indeed, the protocol should support a large number of nodes to enable a large scale deployment of the network. In this paper, we propose a new scalable key management scheme for WSNs which provides a good secure connectivity coverage.…

Read More

Optimal Client-Server Assignment for Internet Distributed Systems

Optimal Client-Server Assignment for Internet Distributed Systems PARALLEL AND DISTRIBUTED SYSTEMS, MARCH 2013 We investigate an underlying mathematical model and algorithms for optimizing the performance of a class of distributed systems over the Internet. Such a system consists of a large number of clients who communicate with each other indirectly via a number of intermediate servers. Optimizing the overall performance of such a system then can be formulated as a client-server assignment problem whose aim is to assign the clients to the servers in such a way to satisfy some…

Read More

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks MOBILE COMPUTING, FEBRUARY 2013 Technology Implementation: JAVA A growing number of ad hoc networking protocols and location-aware services require that mobile nodes learn the position of their neighbors. However, such a process can be easily abused or disrupted by adversarial nodes. In absence of a priori trusted nodes, the discovery and verification of neighbor positions presents challenges that have been scarcely investigated in the literature. In this paper, we address this open issue by proposing a fully distributed cooperative…

Read More

SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems

SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems DEPENDABLE AND SECURE COMPUTING JANUARY/FEBRUARY 2013 Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. This paper presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. Two contexts of trust, service, and recommendation contexts, are defined…

Read More

Toward Privacy-Assured and Searchable Cloud Data Storage Services

Toward Privacy-Assured and Searchable Cloud Data Storage Services Technology Used: Java Cloud computing is envisioned as the next generation architecture of IT enterprises, providing convenient remote access to massively scalable data storage and application services. While this outsourced storage and computing paradigm can potentially bring great economical savings for data owners and users, its benefits may not be fully realized due to wide concerns of data owners that their private data may be involuntarily exposed or handled by cloud providers. Although end-to-end encryption techniques have been proposed as promising solutions…

Read More

A Decentralized Service Discovery Approach on Peer-to-Peer Network

A Decentralized Service Discovery Approach on Peer-to-Peer Network March 2013 Technology Used: Java Service-oriented computing (SOC) is emerging as a paradigm for developing distributed applications. A critical issue of utilizing SOC is to have a scalable, reliable and robust service discovery mechanism. However, traditional service discovery methods using centralized registries can easily suffer from problems such as performance bottleneck and vulnerability to failures in large scalable service networks, thus functioning abnormally. To address these problems, this paper proposes a peer to- peer based decentralized service discovery approach named Chord4S. Chord4S…

Read More