The aim of this study is to carry out a research in distributed data mining using cloud platform. Distributed Data mining becomes a vital component of big data analytics due to the development of network and distribut...
详细信息
We demonstrate a silicon multiple microring based optical (liter with tunable bandwidth and wavelength. The bandwidth can be tuned from 0.6 to 2.8 nm and the wavelength can be tuned over several nanometers.
ISBN:
(纸本)9781479982561
We demonstrate a silicon multiple microring based optical (liter with tunable bandwidth and wavelength. The bandwidth can be tuned from 0.6 to 2.8 nm and the wavelength can be tuned over several nanometers.
Mobile Adhoc Networks (MANETs) are composed of nodes which communicate with one another without network infrastructure. Their advantage being that they can be used in isolation or along with wired infrastructure, usua...
详细信息
In India, the oral cancers are usually presented in advanced stage of malignancy. It is critical to ascertain the diagnosis in order to initiate most advantageous treatment of the suspicious lesions. The main hurdle i...
We designed and implemented a parallel visualisation system for the analysis of large scale time-dependent particle type data. The particular challenge we address is how to analyse a high performance computation style...
详细信息
Data concentration is an important tool for various scientific and engineeringapplications. Recently, torus embedded hypercube have attracted much attention among researchers due to its inherent architectural propert...
详细信息
ISBN:
(纸本)9783319073491
Data concentration is an important tool for various scientific and engineeringapplications. Recently, torus embedded hypercube have attracted much attention among researchers due to its inherent architectural property of two different interconnection networks. In this paper we present an algorithm to perform data concentration on torus embedded hypercube network. Our proposed algorithm takes d(5.5n + 3 log n) time to perform data concentration of d (d
System call information has been one of the most importantcandidates for intrusion detection and forensic analysis research during the lastseveral years. This paper focuses on extraction of system call information int...
详细信息
In this paper, we present a grid structured morphological pattern spectrum based approach for off-line signature verification. The proposed approach has three major phases: preprocessing, feature extraction and verifi...
详细信息
In this paper, we present a grid structured morphological pattern spectrum based approach for off-line signature verification. The proposed approach has three major phases: preprocessing, feature extraction and verification. In the feature extraction phase, the signature image is partitioned into eight equally sized vertical grids and grid structured morphological pattern spectra for each grid is obtained. The grid structured morphological spectrum is represented in the form of 10-bin histogram and normalised to overcome the problem of scaling. The eighty dimensional feature vector is obtained by concatenating all the eight vertical morphological spectrum based normalised histogram. For verification purpose, we have considered two well known classifiers, namely SVM and MLP and conducted experiments on standard signature datasets namely CEDAR, GPDS-160 and MUKOS, a regional language (Kannada) dataset. The comparative study is also provided with the well known approaches to exhibit the performance of the proposed approach.
Mobile cloud computing, an extension of cloud computing paradigm for providing services of existing cloud facility to user application in mobile/portable devices, has been recently presented to overcome inherent limit...
详细信息
In this paper, a new method for off-line signature verification is proposed based on discrete cosine transform (DCT). The proposed approach has two stages, namely feature extraction and representation of signature usi...
详细信息
暂无评论