archive-org.com » ORG » I » IJORCS.ORG

Total: 231

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Image Denoising using Wavelet Transform and various Filters
    Signal Processing Letters IEEE Volume 10 Issue 11 Nov 2003 265 Vol 3 doi 10 1109 LSP 2003 818225 Wavelet Shrinkage and W V D A 10 minute Tour Donoho D L David L Donoho s website William K Pratt Digital Image Processing Wiley 1991 Image Denoising using Wavelet Thresholding and Model Selection Shi Zhong Image Processing 2000 Proceedings 2000 International Conference on Volume 3 10 13 Sept 2000 Pages 262 doi 10 1109 ICIP 2000 899345 Charles Boncelet 2005 Image Noise Models in Alan C Bovik Handbook of Image and Video Processing doi 10 1016 B978 012119792 6 50087 5 R C Gonzalez and R Elwood s Digital Image Processing Reading MA Addison Wesley 1993 M Sonka V Hlavac R Boyle Image Processing Analysis AndMachine Vision Pp10 210 646 670 Raghuveer M Rao A S Bopardikar Wavelet Transforms Introduction To Theory And Application Published By Addison Wesley 2001 pp1 126 Arthur Jr Weeks Fundamental of Electronic Image Processing Jaideva Goswami Andrew K Chan Fundamentals Of Wavelets Theory Algorithms And Applications John Wiley Sons Portilla J Strela V Wainwright M Simoncelli E P Image Denoising using Gaussian Scale Mixturesin the Wavelet Domain TR2002 831 ComputerScience Dept New York University 2002 Martin Vetterli S Grace Chang Bin Yu Adaptive wavelet thresholding for image denoising and compression IEEE Transactions on Image Processing 9 9 1532 1546 Sep 2000 doi 10 1109 83 862633 Zhou Wang Member IEEE Alan Conrad Bovik Fellow IEEE Hamid Rahim Sheikh Student Member IEEE and Eero P Simoncelli Senior Member IEEE Image Quality Assessment From error visibility to structural similarity IEEE transactions on image processing vol 13 no 4 April 2004 doi 10 1109 TIP 2003 819861 Tinku Acharya Ajoy K Ray IMAGE PROCESSING Principles and Applications Hoboken New Jersey A JOHN WILEY SONS MC Publication 2005 doi 10 1002 0471745790 S Poornachandra Wavelet based denoising using subband dependent threshold for ECG signals Digital Signal Processing vol 18 pp 49 55 2008 Rioul O and Vetterli M Wavelets and Signal Processing IEEE Signal Processing Magazine October 1991 pp 14 38 doi 10 1109 79 91217 Ingrid Daubechies Ten Lectures on Wavelets CBMS NSF Regional Conference Series in Applied Mathematics Vol 61 SIAM Philadelphia 1992 doi 10 1137 1 9781611970104 Ruskai M B et al Wavelet and Their Applications 1992 M Antonini M Barlaud P Mathieu and I Daubechies Image coding using wavelet transform IEEE Trans Image Process vol 1 no 2 pp 205 220 Apr 1992 doi 10 1109 83 136597 J Woods and J Kim Image identification and restoration in the sub band domain in Proceedings IEEE Int Conference on Acoustics Speech and Signal Processing San Francisco CA vol III pp 297 300 Mar 1992 doi 10 1109 ICASSP 1992 226242 T L Ji M K Sundareshan and H Roehrig Adaptive Image Contrast Enhancement Based on Human Visual Properties IEEE Transactions on Medical Imaging VOL 13 NO 4 December 1994 IEEE doi 10 1109 42 363111 M R Banham Wavelet Based Image Restoration Techniques Ph D Thesis

    Original URL path: http://www.ijorcs.org/manuscript/id/17/gurmeet-kaur-rupinder-kaur/image-denoising-using-wavelet-transform-and-various-filters (2016-05-01)
    Open archived version from archive

  • Duplicate Detection Of Records in Queries using Clustering
    Computer Science 2 no 2 2012 29 32 doi 10 7815 ijorcs 22 2012 019 Close Abstract ata is one of the major problems in the broad area of data cleaning and data quality in data warehouse Many times the same logical real world entity may have multiple representations in the data warehouse Duplicate elimination is hard because it is caused by several types of errors like typographical errors and different representations of the same logical value Also it is important to detect and clean equivalence errors because an equivalence error may result in several duplicate tuples Recent research efforts have focused on the issue of duplicate elimination in data warehouses This entails trying to match inexact duplicate records which are records that refer to the same real world entity while not being syntactically equivalent This paper mainly focuses on efficient detection and elimination of duplicate data The main objective of this research work is to detect exact and inexact duplicates by using duplicate detection and elimination rules This approach is used to improve the efficiency of the data References Cited By S Chaudhuri K Ganjam V Ganti and R Motwani Robust and Efficient Fuzzy Match for Online Data Cleaning Proc ACM SIGMOD pp 313 324 2003 Kuhanandha Mahalingam and Michael N Huhns Representing and using Ontologies USC CIT Technical Report 98 01 Weifeng Su Jiying Wang and Federick H Lochovsky Record Matching over Query Results from Multiple Web Databases IEEE transactions on Knowledge and Data Engineering vol 22 N0 4 2010 R Ananthakrishna S Chaudhuri and V Ganti Eliminating Fuzzy Duplicates in Data Warehouses VLDB pages 586 597 2002 doi 10 1016 B978 155860869 6 50058 5 Tetlow P Pan J Oberle D Wallace E Uschold M Kendall E Ontology Driven Architectures and Potential Uses of the Semantic Web

    Original URL path: http://www.ijorcs.org/manuscript/id/19/m-anitha-a-srinivas-tp-shekhar-d-sagar/duplicate-detection-of-records-in-queries-using-clustering (2016-05-01)
    Open archived version from archive

  • Cloud GIS for Crime Mapping
    software have been used to develop this application The developer requires only a simple computer connected to the internet The source of crime data is the RSS Really Simple Syndication feeds from various news websites References Cited By S Di Martino et al Spatial OnLine Analytical Processing of Geographic Data through the Google Earth Interface Geocomputation Sustainability and Environmental Planning vol 348 B Murgante et al Eds ed Springer Berlin Heidelberg 2011 pp 163 182 D Kaimaris et al Comparative analysis on the archaeological content of imagery from Google Earth Journal of Cultural Heritage vol 12 pp 263 269 2011 doi 10 1016 j culher 2010 12 007 D Kennedy and M C Bishop Google earth and the archaeology of Saudi Arabia A case study from the Jeddah area Journal of Archaeological Science vol 38 pp 1284 1293 2011 doi 10 1016 j jas 2011 01 003 F M Hsu et al Design and implementation of an intelligent recommendation system for tourist attractions The integration of EBM model Bayesian network and Google Maps Expert Systems with Applications vol 39 pp 3257 3264 2012 doi 10 1016 j eswa 2011 09 013 P Lisa Digging into Google Earth An analysis of Crisis in Darfur Geoforum vol 40 pp 535 545 2009 M Boulos Web GIS in practice III creating a simple interactive map of England s Strategic Health Authorities using Google Maps API Google Earth KML and MSN Virtual Earth Map Control International Journal of Health Geographics vol 4 pp 1 8 2005 A Chang et al Combining Google Earth and GIS mapping technologies in a dengue surveillance system for developing countries International Journal of Health Geographics vol 8 pp 1 11 2009 doi 10 1186 1476 072X 8 49 L Santos et al A web spatial decision support system for vehicle routing using Google Maps Decision Support Systems vol 51 pp 1 9 2011 doi 10 1016 j dss 2010 11 008 E Bradley et al Google Earth and Google Fusion Tables in support of time critical collaboration Mapping the deepwater horizon oil spill with the AVIRIS airborne spectrometer Earth Science Informatics vol 4 pp 169 179 2011 doi 10 1007 s12145 011 0085 4 J Ratcliffe Crime Mapping Spatial and Temporal Challenges Handbook of Quantitative Criminology A R Piquero and D Weisburd Eds ed Springer New York 2010 pp 5 24 J G J Schaaik and J J Kemp Real Crimes on Virtual Maps The Application of Geography and GIS in Criminology Geospatial Technology and the Role of Location in Science vol 96 H J Scholten et al Eds ed Springer Netherlands 2009 pp 217 237 M Wolff and H Asche Geospatial Crime Scene Investigation From Hotspot Analysis to Interactive 3D Visualization Computational Science and Its Applications ICCSA 2009 vol 5592 O Gervasi et al Eds ed Springer Berlin Heidelberg 2009 pp 285 299 R Cammack Open Content Web Mapping Service A Really Simple Syndication RSS Approach Location Based Services and TeleCartography G Gartner et al Eds ed Springer

    Original URL path: http://www.ijorcs.org/manuscript/id/30/harpinder-singh-rajneesh-kumar-amardeep-singh-pk-litoria/cloud-gis-for-crime-mapping (2016-05-01)
    Open archived version from archive

  • Optimal location of Multi-types of FACTS devices using Genetic algorithm
    2016 S Sarda Jigar Viren B Pandya Manish J Chauhan and Dhaval G Patel Optimal location of Multi types of FACTS devices using Genetic algorithm International Journal of Research in Computer Science 2 no 3 2012 11 15 doi 10 7815 ijorcs 23 2012 023 Close Abstract The problem of improving the voltage profile and reducing power loss in electrical networks is a task that must be solved in an optimal manner Therefore placement of FACTS devices in suitable location can lead to control in line flow and maintain bus voltages in desired level and reducing losses is required This paper presents one of the heuristic methods i e a Genetic Algorithm to seek the optimal location of FACTS devices in a power system Proposed algorithm is tested on IEEE 30 bus power system for optimal location of multi type FACTS devices and results are presented References Cited By N G Hingorani and L Gyugi Understanding FACTS Concepts and Technology of Flexible Ac Transmission Systems Standard Publishers Distributors IEEE Press New York 2001 Tjing T Lie and Wanhong Deng Optimal Flexible AC Transmission Systems FACTS Devices Allocation Electrical Power and Energy System Vol 19 No 2 pp 125 134 1997 K Habur and D Oleary FACTS Flexible AC transmission Systems For Cost Effective and Reliable Transmission of Electrical Energy On line available http www siemenstd com D Gotham and G T Heydt Power Flow control and Power Flow Studies for Systems with FACTS devices IEEE Transaction on Power Systems vol 13 no 1 pp 60 65 1998 H A Abdelsalam etal Optimal location of the unified power flow controller in electrical power systems Large Engineering systems Conference on Power Engineeringpp 41 46 28 30 Jul 2004 Taranto GN Pinto LMVG Pereira MVF Representation of FACTS devices in power system economic dispatch IEEE Trans Power System 1992 Vol 2 pp 6 572 Ge SY Chung TS Optimal active power flow incorporating power flow control needs in flexible AC transmission systems IEEE Transaction Power System 1999 Vol 2 pp 44 738 Ambriz Perez H Acha E Fuerte Esquivel CR Advanced SVC model for Newton Raphson Load Flow and Newton optimal power flow studies IEEE Transaction Power System 2000 Vol 1 pp 36 129 Chung TS Li YZ A hybrid GA approach for OPF with consideration of FACTS devices IEEE Power Engineering Rev 2001 Vol 2 pp 47 50 W Ongakul P Bhasaprtra Optimal power flow with FACTS devices by hybrid TS SA approach Electrical Power and Energy Systems 2002 Vol 24 pp 851 857 S N Singh A K David A new approach for placement of FACTS devices in open power markets IEEE Power Engineering Vol 9 pp 58 60 Kesineni Venkateswarlu Ch Sai Babu and Kiran Kumar Kuthadi Improvement of Voltage Stability and Reduce Power Losses by Optimal Placement of UPFC device by using GA and PSO International Journal of Engineering Sciences Research IJESR Vol 01 Issue 02 May 2011 I Pisica C Bulac L Toma M Eremia Optimal SVC Placement

    Original URL path: http://www.ijorcs.org/manuscript/id/23/jigar-ssarda-viren-b-pandya-manish-j-chauhan-dhaval-g-patel/optimal-location-of-multi-types-of-facts-devices-using-genetic-algorithm (2016-05-01)
    Open archived version from archive

  • Modified Approach of Hough Transform for Skew Detection and Correction in Documented Images
    for improving computational efficiency of Hough transform there are various variations have been proposed by researchers to reduce the computational time for skew angle In this Paper we introduced new method which reduces the time complexity without compromising the accuracy of Hough transform References Cited By Hull J 1998 Document image skew detection Survey and annotated bibliography Document Analysis Systems II World Scientific Pub Co Inc pp 40 64 Srihari SN Govindaraju V 1989 Analysis of textual images using the Hough transform Mach Vis Appl 2 141 153 doi 10 1007 BF01212455 Ciardielloat at al 1988 An Experimental System for Office Document Handling and ext Recognition Proceeding of International Conference on Pattern Recognition 2 739 743 Hinds J Fisher L D Amato DP 1990 A document skew detection method using run length encoding and the Hough transform In Proceedings of the 10th international conference pattern recognition IEEE CS Press Los Alamitos CA pp 464 468 doi 10 1109 ICPR 1990 118147 Jiang H Han C Fan K 1997 A fast approach to the detection and correction of skew documents Pattern Recognition Letter 18 675 686 doi 10 1109 ICPR 1990 118147 Yu B Jain AK 1996 A robust and fast skew detection algorithm for generic documents Pattern Recognition 29 10 1599 1629 doi 10 1016 0031 3203 96 00020 9 Spitz AL 1997 Determination of the script and language content of document images IEEE Trans Pattern Anal Mach Intell 19 3 235 245 doi 10 1109 34 584100 Pal U Chaudhuri BB 1996 An improved document skew angle estimation technique Pattern Recogn Lett 17 8 899 904 doi 10 1016 0167 8655 96 00042 6 Amin A Fischer S 2000 A document detection method using the Hough Transform Pattern Anal Appl 3 243 253 doi 10 1007 s100440070009 Singh C Bhatia N Kaur A 2008 Hough transform based fast skew detection and accurate Skew correction methods Pattern Recognition 41 3528 3546 doi 10 1016 j patcog 2008 06 002 Manjunath VN Kumar GH Shivakumara P 2006 Skew detection technique for binary document images based on Hough transform International Journal Technologies l3 3 194 200 Ruilin Zhang Xianghui Z A Skew Detection Method of Fabric images Based on Multi threshold Analysis IEEE 2010 doi 10 1016 j patcog 2008 06 002 Singh Ruby and Ramandeep Kaur Improved Skew Detection and Correction Approach Using Discrete Fourier Algorithm International Journal of Soft Computing and Engineering IJSCE 2013 2231 2307 Kaur Mandip and Simpel Jindal An integrated skew detection and correction using fast fourier transform and dct International Journal of Scientific Technology Res 2 2013 Shanbehzadeh Jamshid Hossein Sarrafzadeh and Sepideh Barekat Rezaei Skew detection of scanned document images 2013 XU Junfeng Chengqing GUO and Jingjing Fang Improved Watermarking Scheme Resistant to Print Scan Patel Jinal Anup Shah and Hetal Patel Skew Angle Detection and Correction using Radon Transform 2015 Basavanna M and S S Gornale Skew Detection and Skew Correction in scanned Document Image using Principal Component Analysis Malakar Samir et al Two

    Original URL path: http://www.ijorcs.org/manuscript/id/27/deepak-kumar-dalwinder-singh/modified-approach-of-hough-transform-for-skew-detection-and-correction-in-documented-images (2016-05-01)
    Open archived version from archive

  • ROI Segmentation for Feature Extraction from Human Facial Images
    Arora ROI Segmentation for Feature Extraction from Human Facial Images International Journal of Research in Computer Science 2 no 3 2012 61 64 doi 10 7815 ijorcs 23 2012 031 Close Abstract Human Computer Interaction HCI is the biggest goal of computer vision researchers Features form the different facial images are able to provide a very deep knowledge about the activities performed by the different facial movements In this paper we presented a technique for feature extraction from various regions of interest with the help of Skin color segmentation technique Thresholding knowledge based technique for face recognition References Cited By Bfasel f 2002 Robust Face Analysis using Convolutional Neural Networks International Conference on Pattern Recogniton ICPR 02 Quebec Canada Vol 2 pp 40 43 Byun M Badler I N 2002 FaacEmote Qualitative Parametric Modifiers for Facial Animations ACM pp 343 349 Desilva C L Miyasato T and Nakatsu R 1997 Facial Emotion Recognition Using Multi modal Information IEEE International Conference on Information Communication and Signal Processing ICICS 97 pp 397 401 Ekman P Friesen V W and Hager C J 2002 FACS Investigator s Guide Malibu Drive Salt Lake City UT pp 55 61 Fasel B Monay F Fatica Perez D 2004 Latent Semantic Analysis of Facial Action Codes for Automatic Facial Expression Recognition MIR 04 New York USA ACM pp 501 506 Gajsek R Struc V Mihelic F 2010 Multi Modal Emotion Recognition Using Canonical Correlations and Acoustic Features International Conference on Pattern Recognition pp 4133 4136 doi 10 1109 ICPR 2010 1005 Gunes H Piccardi M 2006 A Bimodal Face and Body Gesture Database for Automatic Analysis of Human Nonverbal Affective Behavior 18th International Conference on Pattern Recognition ICPR 06 IEEE pp 326 332 doi 10 1109 ICPR 2006 39 Khan M M Ward R Ingleby M 2009

    Original URL path: http://www.ijorcs.org/manuscript/id/31/surbhi-vishal-arora/roi-segmentation-for-feature-extraction-from-human-facial-image (2016-05-01)
    Open archived version from archive

  • A Comparative Study of Recent Ontology Visualization Tools with a Case of Diabetes Data
    Boinski T Bundnik L Jaworska A Mrozinski J Mazurkiewicz K 2009 OCS Domain Oriented Ontology Creation System Polish Journal of Environmental Studies 18 3B pp 35 38 Benjamin B Emmanuel P Ilaria L Gennady L 2011 OntoTrix A Hybrid Visualization for Populated Ontologies Proceedings of WWW2011 Hyderabad India Katifori A Halatsis C Lepouras G Vassilakis C Giannopoulou E 2007 Ontology Visualization Methods A Survey ACM Computing Surveys Vol 39 Issue 4 doi 10 1145 1287620 1287621 Kobsa A 2004 User Experiments with Tree Visualization Systems In IEEE Symposium on Information Visualization INFOVIS 04 9 16 doi 10 1109 INFVIS 2004 70 Katifori A Torou E Halatsis C Lepouras G Vassilakis C 2006 A Comparative Study of Four Ontology Visualization Techniques in Protégé Experiment Setup and Preliminary Results URL http ieeexplore ieee org stamp stamp jsp arnumber 01648294 Johnson B Shneiderman B 1991 Treemaps a space filling approach to the visualisation of hierarchical in formation structures Proc 2nd Int IEEE Visualization Conference San Diego Furnas GW 1986 The FISHEYE view A new look at structured files Proc of the Conf on Human Factors in Computing Systems ACM pp 16 23 Lamping J Rao R Pirolli P 1995 A focus context Technique based on Hyperbolic Geometry for Visual izing Large Hierarchies ACM Conference on Human Factors in Computing Systems CHI 95 New York ACM Press pp 404 408 Munzner T 1997 H3 Laying Out Large Directed Graphs in 3D Hyperbolic Space Proc of the IEEE Symp on Information Visualisation Phoenix USA doi 10 1109 INFVIS 1997 636718 Graham M Kennedy J Benyon D 2000 Towards a Methodology for Developing Visualizations Int J of Human Computer Studies 53 5 789 807 doi 10 1006 ijhc 2000 0415 North C Shneiderman B 2000 Snap together visualisation can users construct and operate coordinated visu alisations Int J of Human Computer Studies 53 715 739 doi 10 1006 ijhc 2000 0418 Risden K Czerwinski MP Munzner T Cook D 2000 An initial examination of ease of use for 2D and 3D information visualizations of web content Int J of Human Computer Studies 53 695 714 doi 10 1006 ijhc 2000 0413 Wills GJ 1997 NicheWorks Interactive Visualisation of Very Large Graphs Proc Graph Drawing 97 Rome Italy Springer Verlag pp 403 414 Herman I Melancon G Marshall MS 2000 Graph Visualization and Navigation in Information Visualisa tion a Survey IEEE Transactions on Visualisation and Computer Graphics 6 1 24 43 doi 10 1109 2945 841119 North SC 1995 Incremental layout in DynaDAG Proc of the Symposium on Graph Drawing GD 95 Springer Verlag pp 409 418 Eades P 1984 A Heuristic for Graph Drawing Congressus Numerantium 42 149 160 Boinski T Jaworska A Kleczkowski R Kunowski P 2010 Ontology Visualization Proceedings of the 2nd International Conference on Information Technology ICIT Musen MA 1989 Automated support for building and extending expert models Machine Learning 4 347 376 doi 10 1007 BF0013071 Noy NF Musen MA 2000 PROMPT Algorithm and Tool for Automated Ontology Merging and Alignment In

    Original URL path: http://www.ijorcs.org/manuscript/id/26/v-swaminathan-r-sivakumar/a-comparative-study-of-recent-ontology-visualization-tools (2016-05-01)
    Open archived version from archive

  • A Novel Approach to Genetic Algorithm based Cryptography
    strong algorithmic approach like AES and the other is the approach that mimics nature The work presented explores various attempts that have been made in this direction and suggests a new technique using Genetic Algorithms The technique has been implemented and analyzed The results obtained are encouraging The samples satisfy most of the tests including gap test frequency test etc thus strengthening the belief that the algorithm is as strong if not better than any of the mathematically strong approach References Cited By Harsh Bhasin Nakul Arora Reliability Infocom Technology and Optimization 2010 Conference Proceedings pages 226 230 Bethany Delman Genetic Algorithms in Cryptography MS Thesis 2004 ABDELSALAM ALMARIMI et al A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS Published in Proceeding CERMA 10 Proceedings of the 2010 IEEE Electronics Robotics and Automotive Mechanics Conference Menezes A van Oorschot P Vanstone S 1997 Handbook of Applied Cryptography Boca Raton CRC Press Norman D Jorstad CRYPTOGRAPHIC ALGORITHM METRICS January 1997 Harsh Bhasin Surbhi Bhatia Use of Genetic Algorithms for Finding Roots of Algebraic Equations IJCSIT Volume 2 Issue 4 Pages 1693 1696 Harsh Bhasin Supreet Singh GA Correlation Based Rule Generation for Expert Systems IJCSIT Volume 3 Issue 2 Pages 3733 3736 Harsh Bhasin Surbhi Bhatia Application of Genetic Algorithms in Machine learning IJCSIT Volume 2 Issue 5 Pages 2412 2415 Stephen Wolfram Cellular Automata And Complexity Collected Papers 1994 ISBN 0 201 62716 7 Thomson J J Joseph John 7 Mar 2010 The corpuscular theory of matter Raymond Kan Xiaulo Wang November 2008 On the Distribution of the sample Autocorrelation Coefficients Mishra Swati and Siddharth Bali Public key cryptography using genetic algorithm International Journal of Recent Technology and Engineering 2 2 2013 150 154 Ratan Ram Applications of genetic algorithms in cryptology Proceedings of the Third International Conference on

    Original URL path: http://www.ijorcs.org/manuscript/id/22/farhat-ullah-khan-surbhi-bhatia/a-novel-approach-to-genetic-algorithm-based-cryptography (2016-05-01)
    Open archived version from archive



  •