Sciweavers

740 search results - page 125 / 148
» Analysis of Scheduling Algorithms with Reservations
Sort
View
IVC
2006
156views more  IVC 2006»
14 years 9 months ago
Image encryption using chaotic logistic map
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques.Inthis communication,weproposea ...
Narendra K. Pareek, Vinod Patidar, Krishan K. Sud
EOR
2007
151views more  EOR 2007»
14 years 9 months ago
A possibilistic decision model for new product supply chain design
This paper models supply chain (SC) uncertainties by fuzzy sets and develops a possibilistic SC configuration model for new products with unreliable or unavailable SC statistical...
Juite Wang, Yun-Feng Shu
IVC
2007
104views more  IVC 2007»
14 years 9 months ago
Text segmentation in color images using tensor voting
In natural scene, text elements are corrupted by many types of noise, such as streaks, highlights, or cracks. These effects make the clean and automatic segmentation very difficu...
Jaeguyn Lim, Jonghyun Park, Gérard G. Medio...
CAD
2005
Springer
14 years 9 months ago
A new recognition model for electronic architectural drawings
Current methods for recognition and interpretation of architectural drawings are limited to either low-level analysis of paper drawings or interpretation of electronic drawings th...
Tong Lu, Chiew-Lan Tai, Feng Su, Shijie Cai
PR
2007
85views more  PR 2007»
14 years 9 months ago
Grey-level hit-or-miss transforms - part II: Application to angiographic image processing
The hit-or-miss transform (HMT) is a fundamental operation on binary images, widely used since 40 years. As it is not increasing, its extension to grey-level images is not straigh...
Benoît Naegel, Nicolas Passat, Christian Ron...