Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Image Atlas

Product Compare (0)

A Reduced complexity MIMO Receiver via Channel Ordering
star_border star_border star_border star_border star_border

A Reduced complexity MIMO Receiver via Channel Ordering

We consider the problem of maximum likelihood (ML) signal detection in multiple-input multiple-outpu..

3,000.00INR
A Region Wised Medium Transmission Based Image De hazing Method
star_border star_border star_border star_border star_border

A Region Wised Medium Transmission Based Image De hazing Method

Our atmosphere contains huge quantities of particles, compromising outdoor photography. They cause s..

3,500.00INR
A regional image fusion based on similarity characteristics
star_border star_border star_border star_border star_border

A regional image fusion based on similarity characteristics

Here we provide a novel approach in the fusion based on similar region. For the image fusion we impl..

2,500.00INR
A RESEARCH OF FEATURE-BASED IMAGE MOSAIC ALGORITHM
star_border star_border star_border star_border star_border

A RESEARCH OF FEATURE-BASED IMAGE MOSAIC ALGORITHM

Abstract:          In this paper, three image registra..

4,500.00INR
A Review Paper on Currency Recognition System
star_border star_border star_border star_border star_border

A Review Paper on Currency Recognition System

In this paper, an algorithm based on the frequency domain feature extraction method is discussed fo..

3,500.00INR
A SECRET-SHARING-BASED METHOD FOR AUTHENTICATION OF GRAY SCALE DOCUMENT IMAGES VIA THE USE OF THE PNG IMAGE WITH A DATA REPAIR
star_border star_border star_border star_border star_border

A SECRET-SHARING-BASED METHOD FOR AUTHENTICATION OF GRAY SCALE DOCUMENT IMAGES VIA THE USE OF THE PNG IMAGE WITH A DATA REPAIR

Abstract· A new blind authentication method based on the secret sharing technique with a data ..

4,500.00INR
A Secure Image Based Steganographic Model Using RSA Algorithm and LSB Insertion
star_border star_border star_border star_border star_border

A Secure Image Based Steganographic Model Using RSA Algorithm and LSB Insertion

Steganography is the term used to describe the hiding of data in images to avoid detection by attack..

2,500.00INR
A SIFT-BASED FORENSIC METHOD FOR COPY-MOVE ATTACK DETECTION AND TRANSFORMATION RECOVERY
star_border star_border star_border star_border star_border

A SIFT-BASED FORENSIC METHOD FOR COPY-MOVE ATTACK DETECTION AND TRANSFORMATION RECOVERY

ABSTRACT•      The proposed method is able to individuate if copy-move tam..

4,500.00INR
A similarity study of content-based image retrieval system for breast cancer using decision tree
star_border star_border star_border star_border star_border

A similarity study of content-based image retrieval system for breast cancer using decision tree

Content Based Image Retrieval is the process of identification of similar images present in the data..

3,500.00INR
A Single Stage Single Switch Soft Switching Power Factor Correction LED Driver
star_border star_border star_border star_border star_border

A Single Stage Single Switch Soft Switching Power Factor Correction LED Driver

This paper proposes a new isolated single-stage singleswitch soft-switching power-factor-correction ..

3,500.00INR
A SPECTRAL SPATIAL MULTICRITERIA ACTIVE LEARNING TECHNIQUE FOR HYPERSPECTRRAL IMAGE CLASSIFICATION
star_border star_border star_border star_border star_border

A SPECTRAL SPATIAL MULTICRITERIA ACTIVE LEARNING TECHNIQUE FOR HYPERSPECTRRAL IMAGE CLASSIFICATION

Hyperspectral image classification with limited labeled samples is a challenging task and still an o..

3,500.00INR
A Speed-Up Scheme Based on Multiple-Instance Pruning for Pedestrian Detection Using a Support Vector Machine
star_border star_border star_border star_border star_border

A Speed-Up Scheme Based on Multiple-Instance Pruning for Pedestrian Detection Using a Support Vector Machine

In video surveillance applications, the main aim will be identification of the pedestrians i.e., ide..

3,000.00INR
A Strategy of Clustering Modification Directions in Spatial Image Steganography
star_border star_border star_border star_border star_border

A Strategy of Clustering Modification Directions in Spatial Image Steganography

Steganography is the science of hiding information that involves all the techniques used to exchange..

3,500.00INR
A SUITABLE INITIALIZATION PROCEDURE FOR SPEEDING A NEURAL NETWORK JOB-SHOP SCHEDULING
star_border star_border star_border star_border star_border

A SUITABLE INITIALIZATION PROCEDURE FOR SPEEDING A NEURAL NETWORK JOB-SHOP SCHEDULING

Abstract    The proposed modification consists in a suitable choice of the NN (Neura..

4,500.00INR
A supervised method for determining displacement of GLCM
star_border star_border star_border star_border star_border

A supervised method for determining displacement of GLCM

 Here we address a supervised method for determining texel size of a texture.  The texel size can..

2,500.00INR
Showing 91 to 105 of 902 (61 Pages)
Free Website Hit Counter
Free website hit counter