Loading [MathJax]/extensions/MathMenu.js
IEEE Xplore Search Results

Showing 1-25 of 3,753 resultsfor

Results

Recognition of handwritten similar shaped character is a difficult problem and in character recognition system most of the errors occur from similar shaped characters. In this paper we proposed a novel feature extraction technique to improve the recognition results of two similar shaped characters. The technique is based on F-ratio (Fisher Ratio), a statistical measure defined by the ratio to the ...Show More
Clustering is used data mining technique in which a group of similar objects is combined together to form clusters, these clusters are different from the objects in another clusters. This paper describes some clusterization techniques like, partitional technique, hierarchical technique, grid-based technique, density-based technique and their algorithms. Partitional method divides the data set into...Show More
Aptamers are, in general, easier to produce, easier to store and are able to bind to a wider variety of targets than antibodies. For these reasons, aptamers are gaining increasing popularity in environmental monitoring as well as disease detection and disease management applications. This review article examines the research and design of RNA and DNA aptamer based biosensor systems and application...Show More
A recommendation system is an effective supporting tool for a user to obtain the relevant result and avoid information overloading. However, the user cold-start problem has occurred when the system does not have adequate information about the user. In this project, we propose a content-based filtering method that applies the movie genres for finding the similarities among movies. We use the Term F...Show More

Tomographic Vp and Vs structure of the California Central Coast Ranges, in the vicinity of SAFOD, from controlled-source seismic data

;;;;;;

Geophysical Journal International
Year: 2012 | Volume: 190, Issue: 3 | Journal Article |
A seismic reflection/refraction survey across the San Andreas fault near Parkfield, California, has refined our knowledge of the upper crustal structure of the central California Coast Ranges at the San Andreas Fault Observatory at Depth (SAFOD). The survey consisted of a 46-km-long line of seismographs (25–50 m spacing) and 63 explosions (25–200 kg; nominal spacing of 500 m, with some gaps). The ...Show More

Tomographic Vp and Vs structure of the California Central Coast Ranges, in the vicinity of SAFOD, from controlled-source seismic data

;;;;;;

Year: 2012 | Volume: 190, Issue: 3 | Journal Article |
Content Delivery Network (CDN) is a system where computers networked together across the Internet. Contents (especially large media content) are replicated from the origin server to cache servers scattered over the world in order to deliver content to end users in a reliable and timely manner. Cooperation and coordination among them can solve many problems of a particular CDN and is achieved by Vi...Show More
The in-air handwriting is a natural and useful way for human-computer interaction. Yet, to our knowledge, few work has been done for the in-air handwritten Chinese character recognition (IAHCCR). In this paper, we present a multi-stage recognizer to address the problem of IAHCCR. The proposed methods can also deal with the classical handwritten Chinese character recognition (HCCR). We find that th...Show More
With the increase in interchange of data, there is a growing necessity of security. Considering the volumes of digital data that is transmitted, they are in need to be secure. Among the many forms of tampering possible, one widespread technique is Copy Move Forgery (CMF). This forgery occurs when parts of the image are copied and duplicated elsewhere in the same image. There exist a number of algo...Show More
Intellectual property rights are the legal rights that protect the creations of an owner's mind, such as inventions, artistic works, and designs. Designers play a crucial role in the creative industry, and intellectual property rights ensure that their designs are protected from infringement by others. As such, designers can control how their designs are used and monetized. In this paper, we have ...Show More
In this paper, a two-stage scheme for the recognition of Persian handwritten isolated characters is proposed. In the first stage, similar shaped characters are categorized into groups and as a result, 8 groups are obtained from 32 Persian basic characters. In the second stage, the groups containing more than one similar shape characters are considered further for the final recognition. Feature ext...Show More

Similar-shape retrieval in shape data management

R. Mehrotra;J.E. Gary

Computer
Year: 1995 | Volume: 28, Issue: 9 | Magazine Article |
Addresses the problem of similar-shape retrieval, where shapes or images in a shape database that satisfy specified shape-similarity constraints with respect to the query shape or image must be retrieved from the database. In its simplest form, the similar-shape retrieval problem can be stated as, "retrieve or select all shapes or images that are visually similar to the query shape or the query im...Show More

Similar-shape retrieval in shape data management

R. Mehrotra;J.E. Gary

Year: 1995 | Volume: 28, Issue: 9 | Magazine Article |
This paper proposes an outdoor scene image segmentation using graph cut method based on their color information. The basic aim is to differentiate the background (such as sky, ground, vegetation etc) and foreground (such as buildings people etc) of the outdoor scene images based on their color and texture information. This paper shows the comparison of results obtained using graph cut method, grap...Show More
Feature selection plays an important role in machine learning. The best selection of significant feature set results in better performance of classifiers. In this work feature selection using filter approach for classification of 10 different similar looking food grains has been carried out. As part of the work, firstly texture features of food grain images are extracted using color based GLCM. As...Show More
Effective knowledge management (KM) in a knowledge-intensive working environment requires an understanding of workers' information needs for tasks, (task-needs), so that they can be provided with appropriate codified knowledge (textual documents) when performing long-term tasks. This work proposes a novel profiling technique based on implicit relevance feedback and collaborative filtering techniqu...Show More
Visual data mining techniques have proven to be of high value in exploratory data analysis, and they also have a high potential for mining large databases. In this article, we describe and evaluate a new visualization-based approach to mining large databases. The basic idea of our visual data mining techniques is to represent as many data items as possible on the screen at the same time by mapping...Show More
This paper proposes an off-line Thai character recognition system for an unconstrained writing. This system combines both global feature, that represents character shape, and local feature, that represents the symbolic structure, to solve the similarity and variety problems of Thai characters. The pixel distribution is applied, as the global feature, to classify the image into 20 groups of similar...Show More
Even though interaction is an important part of information visualization (Infovis), it has garnered a relatively low level of attention from the Infovis community. A few frameworks and taxonomies of Infovis interaction techniques exist, but they typically focus on low-level operations and do not address the variety of benefits interaction provides. After conducting an extensive review of Infovis ...Show More
Automatic question generation is a technique that generates a question from various sources like structured or unstructured content. Even if, each method has its own shortcoming and strength, we didn’t find any study that did an experimental comparison of the current automatic question generation techniques using a similar dataset. In this study, we analyzed the different state-of-the-art research...Show More
Due to the intrinsic long-tailed distribution of objects in the real world, we are unlikely to be able to train an object recognizer/detector with many visual examples for each category. We have to share visual knowledge between object categories to enable learning with few or no training examples. In this paper, we show that local object similarity information--statements that pairs of categories...Show More
Coronary Heart Disease (CHD) has a significant impact on death rates worldwide; therefore, early and accurate prediction is vital for enhancing timely prevention and improving patient outcomes. However, predicting CHD is challenging because of the imbalanced nature of the dataset. A number of sampling techniques are proposed to overcome this challenge, including random oversampling, undersampling,...Show More
In this paper, we focus on the formulation of a hybrid methodology that combines analytical models, constrained optimization schemes, and machine learning techniques to simplify the execution of dexterous, in-hand manipulation tasks with adaptive robot hands. More precisely, the constrained optimization scheme is used to describe the kinematics of adaptive hands during the grasping and manipulatio...Show More
We investigate from a fractal viewpoint the way in which dark matter is grouped at z = 0 in the Millennium dark matter cosmological simulation. Determination of the crossing point to homogeneity in the Millennium Simulation data is described with regard to the behaviour of the fractal dimension and lacunarity. We use the sliding-window technique to calculate the fractal mass–radius dimension, the ...Show More
To ensure sustainable consumption and production, one way is to reduce waste generation by increasing the reuse rate. We have been working with the bottle classification facility to enhance the efficiency and productivity. Many used bottles come in with unimaginable ways of dirty, defective conditions. To manage the sheer volume of used bottles, we create an AI-enabled, bottle classification syste...Show More
Radio-frequency interference (RFI) signals are a well-known threat for microwave radiometry (MWR) applications. In order to alleviate this problem, different approaches for RFI detection and mitigation are currently under development. Since RFI signals are man made, they tend to have their power more concentrated in the time-frequency (TF) space as compared to naturally emitted noise. The aim of t...Show More