SAR Image Despeckling Based on Nonsubsampled Shearlet Transform Abstract? Synthetic Aperture Radar (SAR) Image despeckling is an important problem in SAR image processing since speckle may interfere with automatic interpretation. This paper presents a new approach for despeckling based on nonsubsampled shearlet transform. The approach introduced here presents two major contributions: (a) Translation-invariant Nonsubsampled Shearlet…
Satellite Image Adaptive Restoration Using Periodic Plus Smooth Image Decomposition and Complex Wavelet Packet Transforms Abstract?A satellite image adaptive restoration method was developed that avoids ringing artifacts at the image boundary and retains oriented features. The method combines periodic plus smooth image decomposition with complex wavelet packet transforms. The framework first decomposes a degraded satellite…
satellite Image Resolution Enhancement using Dual – Tree Complex wavelet Transform and Non Loacl means Abstract? Resolution enhancement (RE) schemes (which are not based on wavelets) suffer from the drawback of losing high-frequency contents (which results in blurring). The discrete-wavelet-transform-based (DWT) RE scheme generates artifacts (due to a DWT shift-variant property). A wavelet-domain approach based…
Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords Abstract?Photos with people (e.g., family, friends, celebrities, etc.) are the major interest of users. Thus, with the exponentially growing photos, large-scale content-based face image retrieval is an enabling technology for many emerging applications. In this work, we aim to utilize automatically detected human attributes that contain semantic…
Scalable secure sharing Personal Health Record in cloud(JSP) Abstract?Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is often outsourced to be stored in a third-party server. In this paper we propose a novel secure and scalable system for sharing PHRs. We focus on…
Scalable secure sharing Personal Health Record using Attribute Based Encryption Abstract? Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those…
Scale invariant and deformation tolerant partial shape matching Abstract– Scale invariant and deformation tolerant partial shape matching. We propose a novel multi-scale shape descriptor for shape matching and object recognition. The descriptor includes three types of invariants in multiple scales to capture discriminative local and semi-global shape features and the dynamic programming algorithm is employed…
Scale-Free Hyperbolic CORDIC Processor and Its Application to Waveform Generation Abstract? Scale-Free Hyperbolic CORDIC Processor and Its Application to Waveform Generation. This paper presents a novel completely scaling-free CORDIC algorithm in rotation mode for hyperbolic trajectory. We use most-significant-1 bit detection technique for micro-rotation sequence generation to reduce the number of iterations. By storing the…
Scene Text Detection via Connected Component Clustering and Nontext Filtering Abstract? we present a new scene text detection algorithm based on two machine learning classifiers: one allows us to generate candidate word regions and the other filters out nontext ones. To be precise, we extract connected components (CCs) in images by using the maximally stable…
Search Engine Abstract? Search Engine Web search engine provides information for the submitted query of the users, without consideration of user’s interests. Personalized Web search is used to consider the user interests for providing the results. Existing research Link-click-concept based ranking (LC2R) algorithm is suggested that extracts a user’s conceptual preferences from users’ click through…
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract?Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such…