Showing 553–564 of 665 results

  • Placeholder

    SAR Image Despeckling Based on Nonsubsampled Shearlet Transform< Final Year Projects >

    0 out of 5
    4,500

    SAR Image Despeckling Based on Nonsubsampled Shearlet Transform Abstract? Synthetic Aperture Radar (SAR) Image despeckling is an important problem in SAR image processing since speckle may interfere with automatic interpretation. This paper presents a new approach for despeckling based on nonsubsampled shearlet transform. The approach introduced here presents two major contributions: (a) Translation-invariant Nonsubsampled Shearlet…

  • Placeholder

    Satellite Image Adaptive Restoration Using Periodic Plus Smooth Image Decomposition and Complex Wavelet Packet Transforms

    0 out of 5
    4,500

    Satellite Image Adaptive Restoration Using Periodic Plus Smooth Image Decomposition and Complex Wavelet Packet Transforms Abstract?A satellite image adaptive restoration method was developed that avoids ringing artifacts at the image boundary and retains oriented features. The method combines periodic plus smooth image decomposition with complex wavelet packet transforms. The framework first decomposes a degraded satellite…

  • Placeholder

    satellite Image Resolution Enhancement using Dual – Tree Complex wavelet Transform and Non Loacl means

    0 out of 5
    4,500

    satellite Image Resolution Enhancement using Dual – Tree Complex wavelet Transform and Non Loacl means Abstract? Resolution enhancement (RE) schemes (which are not based on wavelets) suffer from the drawback of losing high-frequency contents (which results in blurring). The discrete-wavelet-transform-based (DWT) RE scheme generates artifacts (due to a DWT shift-variant property). A wavelet-domain approach based…

  • Placeholder

    Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords

    0 out of 5
    4,500

    Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords Abstract?Photos with people (e.g., family, friends, celebrities, etc.) are the major interest of users. Thus, with the exponentially growing photos, large-scale content-based face image retrieval is an enabling technology for many emerging applications. In this work, we aim to utilize automatically detected human attributes that contain semantic…

  • Placeholder

    Scalable secure sharing Personal Health Record in cloud(JSP)

    0 out of 5
    4,500

    Scalable secure sharing Personal Health Record in cloud(JSP) Abstract?Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is often outsourced to be stored in a third-party server. In this paper we propose a novel secure and scalable system for sharing PHRs. We focus on…

  • Placeholder

    Scalable secure sharing Personal Health Record using Attribute Based Encryption

    0 out of 5
    4,500

    Scalable secure sharing Personal Health Record using Attribute Based Encryption Abstract? Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those…

  • Placeholder

    Scale invariant and deformation tolerant partial shape matching

    0 out of 5
    4,500

    Scale invariant and deformation tolerant partial shape matching Abstract– Scale invariant and deformation tolerant partial shape matching. We propose a novel multi-scale shape descriptor for shape matching and object recognition. The descriptor includes three types of invariants in multiple scales to capture discriminative local and semi-global shape features and the dynamic programming algorithm is employed…

  • Scale-Free Hyperbolic CORDIC Processor and Its Application to Waveform Generation

    0 out of 5
    4,500

    Scale-Free Hyperbolic CORDIC Processor and Its Application to Waveform Generation Abstract? Scale-Free Hyperbolic CORDIC Processor and Its Application to Waveform Generation. This paper presents a novel completely scaling-free CORDIC algorithm in rotation mode for hyperbolic trajectory. We use most-significant-1 bit detection technique for micro-rotation sequence generation to reduce the number of iterations. By storing the…

  • Placeholder

    Scene Text Detection via Connected Component Clustering and Nontext Filtering

    0 out of 5
    4,500

    Scene Text Detection via Connected Component Clustering and Nontext Filtering Abstract? we present a new scene text detection algorithm based on two machine learning classifiers: one allows us to generate candidate word regions and the other filters out nontext ones. To be precise, we extract connected components (CCs) in images by using the maximally stable…

  • Placeholder

    Screen capture utility

    0 out of 5
    4,500

    Screen capture utility Abstract? Screen capture utility Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On Demand * Remote Connectivity * Code…

  • Search Engine

    0 out of 5
    3,500

    Search Engine Abstract? Search Engine Web search engine provides information for the submitted query of the users, without consideration of user’s interests. Personalized Web search is used to consider the user interests for providing the results. Existing research Link-click-concept based ranking (LC2R) algorithm is suggested that extracts a user’s conceptual preferences from users’ click through…

  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    0 out of 5
    4,500

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract?Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such…

End of content

End of content