Showing 1693–1704 of 1968 results

  • Semi-Automated Road Detection From High Resolution Satellite Images by Directional Morphological Enhancement and Segmentation

    0 out of 5
    4,500

    Semi-Automated Road Detection From High Resolution Satellite Images by Directional Morphological Enhancement and Segmentation   Abstract? Extraction of map objects such roads, rivers and buildings from high resolution satellite imagery is an important task in many civilian and military applications. We present a semi-automatic approach for road detection that achieves high accuracy and efficiency. This…

  • Semi-Automatic Segmentation and Classification of Pap Smear Cells

    0 out of 5
    4,500

    Semi-Automatic Segmentation and Classification of Pap Smear Cells Abstract? Semi-Automatic Segmentation and Classification of Pap Smear Cells. Cytologic screening has been widely used for detecting the cervical cancers. In this study, a semiautomatic PC-based cellular image analysis system was developed for segmenting nuclear and cytoplasmic contours and for computing morphometric and textual features to train…

  • Semi-supervised Linear Discriminant Clustering

    0 out of 5
    4,500

    Semi-supervised Linear Discriminant Clustering Abstract? Semi-supervised Linear Discriminant Clustering. This paper devises a semi-supervised learning method called semi-supervised linear discriminant clustering (Semi-LDC). The proposed algorithm considers clustering and dimensionality reduction simultaneously by connecting K-means and linear discriminant analysis (LDA). The goal is to find a feature space where the K-means can perform well in the…

  • Semi-Supervised Linear Discriminant Clustering

    0 out of 5
    4,500

    Semi-Supervised Linear Discriminant Clustering Abstract?This paper devises a semi-supervised learning method called semi-supervised linear discriminant clustering (Semi-LDC). The proposed algorithm considers clustering and dimensionality reduction simultaneously by connecting K-means and linear discriminant analysis (LDA). The goal is to find a feature space where the K-means can perform well in the new space. To exploit the…

  • Semisupervised Wrapper Choice and Generation for Print-Oriented Documents

    0 out of 5
    4,500

    Semisupervised Wrapper Choice and Generation for Print-Oriented Documents Abstract? Semisupervised Wrapper Choice and Generation for Print-Oriented Documents. Information extraction from printed documents is still a crucial problem in many interorganizational workflows. Solutions for other application domains, for < Final Year Projects > example, the web, do not fit this peculiar scenario well, as printed documents…

  • Sensing as a Service: Challenges, Solutions and Future Directions

    0 out of 5
    3,500

    Sensing as a Service: Challenges, Solutions and Future Directions Abstract?Sensors on (or attached to) mobile phones can enable attractive sensing applications in different domains, such as environmental monitoring, social networking, healthcare, transportation, etc. We introduce a new concept, sensing as a service (S2aaS), i.e., < Final Year Projects > providing sensing services using mobile phones…

  • Sentiment Analysis of Twitter Data

    0 out of 5
    4,500

    Sentiment Analysis of Twitter Data Abstract? We examine sentiment analysis on Twitter data. The contributions of this paper are: (1) We introduce POS-specific prior polarity features. (2) We explore the use of a tree kernel to obviate the need for tedious feature engineering. The new features (in conjunction with previously proposed features) and the tree…

  • Sentiment analysis: from opinion mining to human-agent interaction

    0 out of 5
    4,500

    Self-Sentiment analysis: from opinion mining to human-agent interaction AbstractSelf-Sentiment analysis: from opinion mining to human-agent interaction. The opinion mining and human-agent interaction communities are currently addressing sentiment analysis from different perspectives that comprise, on the one hand, disparate sentiment-related phenomena and computational representations, and on the other hand, different detection and dialog management methods. In…

  • Sentiview:Analysis on internet famous topics

    0 out of 5
    4,500

    Sentiview:Analysis on internet famous topics Abstract?There would be value to several domains in discovering and visualizing sentiments in online posts. This paper presents SentiView, an interactive visualization system that aims to analyze public sentiments for popular topics on the Internet. SentiView combines uncertainty modeling and model-driven adjustment. By searching and correlating frequent words in text…

  • Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm

    0 out of 5
    4,500

    Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm Abstract? Steganography basically was defined for the sending secrets message which hides in the image. The secrets message transmitted from one user to another user safely. In the previous system of hiding data in image uses the AES algorithm and Lossy…

  • Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique

    0 out of 5
    4,500

    Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique Abstract?The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous work we proposed separable and reversible encrypted data hiding in encrypted image using AES Algorithm…

  • SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices

    0 out of 5
    4,500

    SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices Abstract? Credit card fraud is a common problem in today?s world. Financial institutions have registered major loses till today due to users being exposed of their credit card information. Shoulder-sur?ng or observation attacks, including card skimming and video recording with hidden cameras while users perform PIN-based…

End of content

End of content