Linked e-resources

Details

Intro; Preface; Contents; About the Editors; 1 A Proposed Artificial Neural Network (ANN) Model Using Geophone Sensors to Detect Elephants Near the Railway Tracks; Abstract; 1 Introduction; 2 Methodology; 3 Result Analysis; 4 Discussion; 5 Conclusion; References; 2 Local Region with Optimized Boundary Driven Level Set Based Segmentation of Myocardial Ischemic Cardiac MR Images; Abstract; 1 Introduction; 2 Materials and Methods; 2.1 Database; 2.2 Methodology; 2.3 Validation Measures; 3 Results and Discussions; 4 Conclusions; References.

3 An Innovative Approach for Automatic Genre-Based Fine Art Painting ClassificationAbstract; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Data Collection; 3.2 Feature Selection and Extraction; 3.3 Classification Algorithm and Ensembling; 4 Analysis of Results; 5 Comparison with Previous Work; 6 Future Works; 7 Conclusion; References; 4 Asymmetric Cryptosystem Using Affine Transform in Fourier Domain; Abstract; 1 Introduction; 2 The Principle; 2.1 Affine Transform; 2.2 Fourier Transform; 3 The Proposed Scheme; 4 Results and Discussion; 5 Conclusions; References.

5 A Novel Technique for an Adaptive Feedback Canceller for Hearing AidsAbstract; 1 Introduction; 1.1 Statement of the Problem; 2 Background; 3 Verification and Results; 3.1 Perceptual Evaluation of Speech Quality; 3.2 Perceptual Evaluation of Speech Quality for a Speech Signal; 3.3 Perceptual Evaluation of Speech Quality for a Music Signal; 4 Conclusions; 6 Preprocessing of Skin Cancer Using Anisotropic Diffusion and Sigmoid Function; Abstract; 1 Introduction; 2 Literature Survey; 3 Proposed Method; 3.1 Normalization; 3.2 Anisotropic Diffusion Function; 3.3 Selecting the Conduction Function.

3.4 Calculating the Gradient3.5 Estimating Gradient Threshold Parameter; 3.6 Stopping Criteria; 3.7 Contrast Adjustment Using Sigmoid Function; 4 Experimental Results; 5 Conclusion; References; 7 An Incremental Algorithm for Mining Closed Frequent Intervals; Abstract; 1 Introduction; 2 Related Works; 3 Preliminaries and Theoretical Background; 3.1 Preliminaries; 3.2 Theoretical Background; 4 Problem Definition; 5 Proposed Method; 5.1 Array Structure to Store a Set of Intervals; 5.2 Algorithm; 6 Experimental Results; 7 Conclusion; References.

Crime Pattern Analysis by Identifying Named Entities and Relation Among Entities1 Introduction; 2 Proposed Framework; 2.1 Data Collection and Preparation; 2.2 Named Entity Recognition; 2.3 Similarity Among Entity Pairs; 2.4 Relation Extraction; 3 Experimental Results; 4 Conclusion and Future Work; References; 9 A Secure High-Capacity Video Steganography Using Bit Plane Slicing Through (7, 4) Hamming Code; Abstract; 1 Introduction; 2 Related Work; 3 Proposed Method; 3.1 Numerical Illustration; 4 Experimental Result and Comparison; 5 Security Analysis; 6 Conclusion; References.

Browse Subjects

Show more subjects...

Statistics

from
to
Export