Sciweavers

1362 search results - page 224 / 273
» Region Based Segmentation Using the Tree of Shapes
Sort
View
FUIN
2006
107views more  FUIN 2006»
14 years 11 months ago
Learning Sunspot Classification
Sunspots are the subject of interest to many astronomers and solar physicists. Sunspot observation, analysis and classification form an important part of furthering the knowledge a...
Trung Thanh Nguyen, Claire P. Willis, Derek J. Pad...
FLAIRS
2006
15 years 1 months ago
Design, Implementation and Performance Analysis of Pervasive Surveillance Networks
Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system are expresse...
Amit Goradia, Zhiwei Cen, Clayton Haffner, Ning Xi...
ENGL
2007
107views more  ENGL 2007»
14 years 11 months ago
Pixel Fusion Based Curvelets and Wavelets Denoise Algorithm
—Curvelets denoise approach has been widely used in many fields for its ability to obtain high quality result images. However artifacts those appear in the result images of curve...
Liyong Ma, Jiachen Ma, Yi Shen
APPINF
2003
15 years 1 months ago
Seismic Signal Analysis using Correlation Dimension
Multifractal analysis is a new and promising approach to analyze and characterize non-stationary signals such as seismic signals, electrocardiograms, heart rate variability signal...
Soundararajan Ezekiel, Matthew J. Barrick, Matthew...
GIS
2009
ACM
16 years 26 days ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku