prick-test 发表于 2025-3-23 13:28:20

http://reply.papertrans.cn/47/4698/469781/469781_11.png

Judicious 发表于 2025-3-23 16:38:18

Crop Classification Using Gene Expression Programming Technique and output variables. We have also compared the classification efficiencies obtained with those of other classifiers namely Support vector machines and Artificial neural networks. Sensitivity Analysis has also been carried out to determine the significance of each input variable.

cravat 发表于 2025-3-23 19:49:56

Indexing for Image Retrieval: A Machine Learning Based Approachombination of multiple features/ modalities for defining composite document indices in genetic algorithm based framework. We have demonstrated the evaluation of framework on dataset of handwritten digit images. Subsequently, the utility of the framework is explored for development for multi-modal retrieval of document images.

背带 发表于 2025-3-23 23:08:13

An Object Separability Based No-Reference Image Quality Measure Using Statistical Properties of Objea very challenging task. In this paper we propose an image quality measure using the concept of object separability. We define object separability using variance. Two objects are very well separated if variance of individual object is less and mean pixel values of neighboring objects are very different.

GLUE 发表于 2025-3-24 05:50:34

Semantic Annotation of Web Documents for Efficient Information Retrievalee of correlation between a tag and the consequent web document. As the annotation would be done automatically, the results obtained for a query would always be relevant and thus the improved precision and recall.

saphenous-vein 发表于 2025-3-24 07:41:02

Software Security Testing Process: Phased Approachscribes which activity is to be carried out when. Given the need and significance of phased approach of security testing, this paper proposes different testing activities to be carried out while integrating it within the security development life cycle.

acrimony 发表于 2025-3-24 13:51:33

http://reply.papertrans.cn/47/4698/469781/469781_17.png

药物 发表于 2025-3-24 15:28:30

Self-embedding Pixel Wise Fragile Watermarking Scheme for Image Authenticationithms and embedded into the three least significant bits (LSBs) of the corresponding pixel in the host image. At the receiver side by comparing the recalculated and extracted LSBs, one can easily identify the tampered pixels of the watermarked image. Results of experiments demonstrate that the proposed scheme has very high fragility and fidelity.

Ataxia 发表于 2025-3-24 19:14:35

http://reply.papertrans.cn/47/4698/469781/469781_19.png

mendacity 发表于 2025-3-25 03:06:19

1865-0929 nternational Conference on Intelligent Interactive Technologies and Multimedia, IITM 2013, held in Allahabad, India, in March 2013. The 15 revised full papers and the 12 revised short papers were carefully reviewed and selected from more than 90 submissions. The papers present the latest research an
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Intelligent Interactive Technologies and Multimedia; Second International Anupam Agrawal,R. C. Tripathi,M. D. Tiwari Conference proceedings