?TACI: Taxonomy-Aware Catalog Integration Abstract? TACI: Taxonomy-Aware Catalog Integration.A fundamental data integration task faced by online commercial portals and commerce search engines is the integration of products coming from multiple providers to their product catalogs. In this scenario, the commercial portal has its own taxonomy (the ?master taxonomy?), while each data provider organizes its products…
3-D Face Recognition Under Occlusion Using Masked Projection Abstract?With advances in sensor technology, the three-dimensional (3-D) face has become an emerging biometric modality, preferred especially in high security applications. However, dealing with occlusions covering the facial surface is a great challenge, which should be handled to enable applicability to fully automatic security systems. In this…
A 2D Discrete Wavelet Transform Based 7- State Hidden Markov Model for Efficient Face Recognition Abstract? A 2D Discrete Wavelet Transform Based 7- State Hidden Markov Model for Efficient Face Recognition. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…
A Block-Mean Difference Based Sorting Scheme on Lossy Partail Distortion Search for Fast Optimal Motion Estimation Abstract? This work presents an efficient lossy partial distortion search (PDS) algorithm named adaptive mean difference based partial distortion search (A-MDPDS). The proposed A-MDPDS algorithm reduces computations by using a halfway-stop technique in the calculation of block distortion measure…
A Cloud Computing Based Telemedicine Service Abstract?Health is the greatest possession?. Various techniques are drawn for the better treatment of health of society. As the technology is reaching its peak, it is emerging in medical treatments quickly and fruitfully giving birth to ?telemedicine? – invention of technology in medicine. Earlier slow and erroneous processes are…
A CMOS High-Voltage Transmitter IC forUltrasound Medical Imaging Applications Abstract-A CMOS High-Voltage Transmitter IC forUltrasound Medical Imaging Applications. A high-voltage (HV) transmitter integrated circuit for ultrasound medical imaging applications is implemented using 0.18-?m bipolar/CMOS/DMOS technology. The proposed HV transmitter achieves high integration by only employing standard CMOS transistors in a stacked configuration with dynamic gate…
A Coarse to Fine Minutiae-Based Latent Palmprint Matching Abstract? The availability of live-scan palmprint technology, high resolution palmprint recognition has started to receive significant attention in forensics and law enforcement. In forensic applications, latent palmprints provide critical evidence as it is estimated that about 30 percent of the latents recovered at crime scenes are those…
A Cocktail Approach for Travel Package Recommendation Abstract? Recent years have witnessed an increased interest in recommender systems. Despite significant progress in this field, there still remain numerous avenues to explore. Indeed, this paper provides a study of exploiting online travel information for personalized travel package recommendation. A critical challenge along this line is to…
A Comber Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS attack Abstract?Cloud computing is an internet based pay as use service which provides three layered services (Software as a Service, Platform as a Service and Infrastructure as a Service) to its consumers on demand. These on demand service facilities provide to its…
A Combination of Feature Extraction Methods with an Ensemble of Different Classifiers for Protein Structural Class Prediction Problem Abstract? A Combination of Feature Extraction Methods with an Ensemble of Different Classifiers for Protein Structural Class Prediction Problem. Better understanding of structural class of a given protein reveals important information about its overall folding type and…
A combined approach to ensure data security in cloud computing Abstract? A combined approach to ensure data security in cloud computing. Offering real-time data security for petabytes of data is important for cloud computing. A recent survey on cloud security states that the security of users’ data has the highest priority as well as concern….