Search
Products meeting the search criteria
Algorithm-for-Efficient-Attendance-Management-Face-Recognition-based-approach
Spoofing attacks are one of the security traits that biometric recognition systems are proven to be ..
Algorithms for the Digital Restoration of Torn Films
Therefore, in order to digitally restore a detected torn frame, the following tasks must be performe..
An Algorithm for Detecting Brain Tumors in MRI Images
In this paper, a computer-based method for defining tumor region in the brain using MRI images is p..
An Area-Based Image Fusion Scheme for the Integration of SAR and Optical Satellite Imagery
Here we provide a novel approach in the fusion based on non-subsampled contourlet transform (PAN SHA..
An Automatic Mass Detection System in Mammograms Based on Complex Texture Features
Screening and early detection of breast cancer needs an automated system that identifies the breast ..
An Efficient and Adaptive Data Compression Technique for Energy Conservation in Wireless Sensor Networks
The objective of this project is to conserve the energy in wireless sensor network by using the data..
An Efficient and Clinical Oriented 3D Liver Segmentation Method
By segmenting, modeling, and visualizing computed tomography sequence data, surgeons can better und..
An Efficient Automated System for Detection of Diabetic Retinopathy from Fundus Images Using Support Vector Machine and Bayesian Classifiers
Early diagnosis of diabetes and treatment can prevent vision loss for patients and the preliminary s..
An Efficient Multi-Modal Biometric Person Authentication System Using Fuzzy Logic
Authentication one of the research areas in recent year there are so many authentication method is t..
An Efficient SVD-Based Method for Image Denoising
We will demonstrate three techniques of image de-noising through Singular Value Decomposition (SVD)..
An Efficient SVD-Based Method for Image Denoising
Image denoising has always been an important part of signal processing, especially in the digitized ..
An efficient and secure cipher scheme for images confidentiality preservation
A novel image encryption scheme base d on two rounds of substitution –diffusion is proposed. Two mai..
An equalised global graphical model-based approach for multi-camera object tracking
Extraction of moving object is an important step in the system of video surveillance, traffic monito..
An equalized global graph model-based approach for multi-camera object tracking
Non-overlapping multi-camera visual object track-ing typically consists of two steps: single camer..