Interstellar 发表于 2025-3-23 12:08:16

Intelligent System Approach to Real-Time Video Denoising Using Lifting-Based Wavelet Technique,her point. We propose a new method for an efficient and improved quality real-time video denoising using a temporal video slicing (TVS) technique, lifting-based dual-tree complex wavelet transform (L-DTCWT), and adaptive thresholding approach. The TVS technique extracts discrete frames from a noisy

步兵 发表于 2025-3-23 16:04:50

Data Loss Prevention Scheme Using ADCN with Effective Tour Strategy in Wireless Sensor Network, wireless sensor network (WSN), and hence, reliable data dissemination is desirable. In WSN, event detection ratio should be very high. In such condition, huge data are generated by event node. But there is always limitation of buffer size. As a result, it gets overflow. The data which are important

Accommodation 发表于 2025-3-23 18:48:44

Network Information Security Model Based on Web Data Mining,One of the most common techniques that are used to enhance the performance of information security in networks is ‘web data mining.’ This technology is found to be effective in providing information security in a network. This paper presents a meta-analytic report on information security by using da

Neonatal 发表于 2025-3-23 23:55:07

http://reply.papertrans.cn/48/4715/471403/471403_14.png

苦笑 发表于 2025-3-24 02:59:58

Adaptive Filter Algorithms Based Noise Cancellation Using Neural Network in Mobile Applications,e signal from the corrupted signal. We propose signal extraction using artificial neural network hybrid back propagation adaptive for mobile systems. The performance analysis of the proposed hybrid adaptive algorithms is carried out based on the error convergence and correlation coefficient. By taki

1FAWN 发表于 2025-3-24 09:23:54

A Novel Approach to Database Confidentiality in Online Voting System,se public voting and reduce the cost involved in an election, we need an online voting system. Public will be motivated to vote if they believe in the privacy and security of the system. This paper addresses issues in identification and authentication in the online voting system. Password and six-di

CHOKE 发表于 2025-3-24 11:41:18

Attending Prominent Face in the Set of Multiple Faces Through Relative Visual Saliency, dominance features decide the focus on attention. Attention boosts up the recognition and identification process in a crowd and hence plays an excelling role in the area of visual surveillance and robotic vision. Using different computer vision-based techniques, enormous researches have been carrie

不易燃 发表于 2025-3-24 15:41:16

Parallel Palm Print Identification Using Fractional Coefficients of Palm Edge Transformed Images onages for Haar transform, Cosine and Kekre transform on the GPU-based system running on CUDA platform. In this, three edge detection methods are applied on palm image to obtain the palm edge images. Transform palm edge images are obtained using three different image transforms. The characteristics of

defenses 发表于 2025-3-24 22:12:54

A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generat the existence of secret communication. Hence, it is extensively used to solve the issues related to data security. In this paper, a secure and lossless spatial domain image steganography technique is proposed. Stream of secret data is hidden in quarter part of image by identifying suitable location

现实 发表于 2025-3-25 01:34:15

Three-Dimensional MRI Brain Image Analysis on Hadoop Platform,omes essential for medical practitioners. This paper focuses on implementation of automatic diagnosis of three-dimensional data using the MapReduce framework. After flourishing completion of two-dimensional image analysis of magnetic resonance imaging (MRI) brain pictures for detecting tumor, we hav
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: International Conference on Intelligent Computing and Applications; ICICA 2016 Subhransu Sekhar Dash,Swagatam Das,Bijaya Ketan Pa Conferenc