Sciweavers

1486 search results - page 170 / 298
» Firewall Rules Analysis
Sort
View
ICDAR
2011
IEEE
14 years 4 months ago
A Handwritten Character Extraction Algorithm for Multi-language Document Image
—In this paper, we propose a novel method for extracting handwritten characters from multi-language document images, which may contain various types of characters, e.g. Chinese, ...
Yonghong Song, Guilin Xiao, Yuanlin Zhang, Lei Yan...
ICDAR
2011
IEEE
14 years 4 months ago
Aletheia - An Advanced Document Layout and Text Ground-Truthing System for Production Environments
- Large-scale digitisation has led to a number of new possibilities with regard to adaptive and learning based methods in the field of Document Image Analysis and OCR. For ground t...
C. Clausner, Stefan Pletschacher, Apostolos Antona...
BMCBI
2008
226views more  BMCBI 2008»
15 years 4 months ago
ProteoLens: a visual analytic tool for multi-scale database-driven biological network data mining
Background: New systems biology studies require researchers to understand how interplay among myriads of biomolecular entities is orchestrated in order to achieve high-level cellu...
Tianxiao Huan, Andrey Y. Sivachenko, Scott H. Harr...
IDA
2008
Springer
15 years 4 months ago
Estimating the depth of anesthesia using fuzzy soft computation applied to EEG features
Estimating the depth of anesthesia (DOA) is still a challenging area in anesthesia research. The objective of this study was to design a fuzzy rule based system which integrates el...
V. Esmaeili, Amin Assareh, M. B. Shamsollahi, Moha...
TNN
1998
125views more  TNN 1998»
15 years 4 months ago
Symbolic connectionism in natural language disambiguation
Abstract—Natural language understanding involves the simultaneous consideration of a large number of different sources of information. Traditional methods employed in language an...
Samuel W. K. Chan, James Franklin