Title: Information system security (ISS) – V02
Topic: Analyzing Attacker Logs And Prevent External/Internal Attacks > prevention system and detecting system
– proposal, the title & function
First you must do Project Specification Form:
A: FYP Title
B: Brief description on project background. (.i.e. problem context, rationale, description of problem area, nature of challenge)
C: Brief description of project objectives.(i.e. scope of proposal and deliverables)
D: Brief description of the resources needed by the proposal (i.e. hardware, software, access to information / expertise, user involvement etc.)
E: Academic research being carried out and other information, techniques being learned.(i.e. what are the names of books you are going to read / data sets you …
Your diagrams must follow correct UML notation and naming conventions, and each diagram should include a title and legend.
have you incl;uded the titile and legends?
TASK 2: Research task
In this task you are requested to research Adaptive Histogram Equalization (AHE). Compare this method to regular Histogram Equalization (HE) and Contrast Limited Adaptive Histogram Equalization (CLAHE). You task is to understand these methods, and then explain the methods, including mathematical models and algorithmic steps. You are not required to implement any of the methods. Then you need to apply these methods to some images. It is not easy to find tool that will apply AHE and CLAHE but you can find images that these methods applied to. Then discuss differences. Finally, you should add a conclusion and references section. Even if you give reference you cannot copy any material from the internet (except for images only for this assignment). Entire document should be written by you with your own words. If you claim something you must either base it off your observation or it should have a reference backing the claim. If you are going to do this task, I suggest you to read how to write a research article. Your document should at least be 5 pages of text, excluding images.