Search Results - "International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007)"

Refine Results
  1. 1

    A Fuzzy Logic Based Power Electronic System for Wind Energy Conversion Scheme by Gidwani, L., Kumar, R.

    “…This paper used fuzzy logic theory to study the behavior of a simple pulse width modulated three phase voltage controlled VSI, which feeds a weak AC network…”
    Get full text
    Conference Proceeding
  2. 2

    Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping by Myna, A.N., Venkateshmurthy, M.G., Patil, C.G.

    “…Due to the abundantly available imaging technologies, manipulation of digital images has become a serious problem nowadays, in various fields like medical…”
    Get full text
    Conference Proceeding
  3. 3

    Avoiding Traffic Jam Using Ant Colony Optimization - A Novel Approach by Bedi, P., Mediratta, N., Dhand, S., Sharma, R., Singhal, A.

    “…Ant colony optimization (ACO) is a meta-heuristic based on colony of artificial ants which work cooperatively, building solutions by moving on the problem…”
    Get full text
    Conference Proceeding
  4. 4

    Image Compression Using SVD by Prasantha, H.S., Shashidhara, H.L., Balasubramanya Murthy, K.N.

    “…It is well known that the images, often used in variety of computer applications, are difficult to store and transmit. One possible solution to overcome this…”
    Get full text
    Conference Proceeding
  5. 5

    Particle Swarm Optimization Using Gaussian Inertia Weight by Pant, M., Radha, T., Singh, V.P.

    “…In this paper we have proposed three variations of the Basic Particle Swarm Optimization (BPSO), called GWPSO+ED, GWPSO+GD and GWPSO+UD. The novelty of the…”
    Get full text
    Conference Proceeding
  6. 6

    Software Reliability Prediction Using Wavelet Neural Networks by Raj Kiran, N., Ravi, V.

    “…In this paper, we propose the use of wavelet neural networks (WNN) to predict software reliability. In WNN, we employed two kinds of wavelets - Morlet wavelet…”
    Get full text
    Conference Proceeding
  7. 7

    An Efficient Gateway Discovery in Ad Hoc Networks for Internet Connectivity by Kumar, Rakesh, Misra, Manoj, Sarje, Anil K.

    “…Integration of MANET with the Internet is a challenging problem. It is important that dynamically deployed wireless ad hoc networks should also gain access to…”
    Get full text
    Conference Proceeding
  8. 8

    Line Removal and Restoration of Handwritten Strokes by Arvind, K.R., Kumar, J., Ramakrishnan, A.G.

    “…In document images, we often find printed lines over-lapping with hand written elements especially in case of signatures. Typical examples of such images are…”
    Get full text
    Conference Proceeding
  9. 9

    Similarity Analysis of Patent Claims Using Natural Language Processing Techniques by Indukuri, K.V., Ambekar, A.A., Sureka, A.

    “…Claims typically found at the end of a patent document are one of the key elements of a patent and define the boundaries or scope of protection conferred by a…”
    Get full text
    Conference Proceeding
  10. 10

    A New Particle Swarm Optimization with Quadratic Interpolation by Pant, M., Radha, T., Singh, V.P.

    “…In this paper we have presented a new variant of Basic Particle Swarm Optimization (BPSO) algorithm named QIPSO for solving global optimization problems. The…”
    Get full text
    Conference Proceeding
  11. 11

    A Road Traffic Signal Recognition System Based on Template Matching Employing Tree Classifier by Varun, S., Singh, Surendra, Kunte, R. Sanjeev, Samuel, R.D. Sudhaker, Philip, Bindu

    “…The traffic sign detection and recognition system is an essential module of the driver warning and assistance system. Smart vehicles are the order of the day…”
    Get full text
    Conference Proceeding
  12. 12

    Wavelet Based Image Denoising Using Adaptive Thresholding by Sudha, S., Suresh, G.R., Sukanesh, R.

    “…The denoising of a natural image corrupted by Gaussian noise is a long established problem in signal or image processing. Even though much work has been done…”
    Get full text
    Conference Proceeding
  13. 13

    Data Encryption Using Event-related Brain Signals by Ravi, K.V.R., Palaniappan, R., Eswaran, C., Phon-Amnuaisuk, S.

    “…A method based on event-related brain signal is used for data encryption. The idea is to shuffle the Huffman tree using an encryption key generated by…”
    Get full text
    Conference Proceeding
  14. 14

    Image enhancement method for underwater, ground and satellite images using brightness preserving histogram equalization with maximum entropy by Singhai, J., Rawat, P.

    “…Visibility in an underwater and satellite images is poor, also light is strongly attenuated in water, producing images of low contrast and little color…”
    Get full text
    Conference Proceeding
  15. 15

    Lung Nodule Diagnosis from CT Images Using Fuzzy Logic by Samuel, C.C., Saravanan, V., Vimala Devi, M.R.

    “…In this paper we present a technique for recognizing the lung nodules for different diagnosis of lung cancer based on CT images. Nodule detection is carried in…”
    Get full text
    Conference Proceeding
  16. 16

    Recognition of Postal Codes from Fingerspelling Video Sequence by Guru, D.S., Suraj, M.G.

    “…In this paper, we propose an appearance based model, specifically 2D PCA model for recognising fingerspelling pin codes in a video. The video is handled as a…”
    Get full text
    Conference Proceeding
  17. 17

    Clustering Principal Components for Identification and Analysis of Prime Activity and Accompanying Activities in Scattered fMRI Data by Suma, H.N., Murali, S.

    “…The multi stimuli fMRI data tends to appear scattered because of involvement of multiple activity patterns. The detection of prime activity in the scattered…”
    Get full text
    Conference Proceeding
  18. 18

    Symbolic Representation of On-line Signatures by Guru, D.S., Prakash, H.N.

    “…In this paper, we present a method of representing on-line signatures by interval valued symbolic features. Global features of on-line signatures are used to…”
    Get full text
    Conference Proceeding
  19. 19

    A Two Stage Classification Approach for Handwritten Devnagari Characters by Arora, Sandhya, Bhatcharjee, Debotosh, Nasipuri, Mita, Malik, Latesh

    “…The paper presents a two stage classification approach for handwritten Devanagari characters. The first stage is using structural properties like shirorekha,…”
    Get full text
    Conference Proceeding
  20. 20

    1D Wavelet Transform of Projection Profiles for Isolated Handwritten Malayalam Character Recognition by John, R., Raju, G., Guru, D.S.

    “…This paper presents a novel method based on wavelet transform for offline recognition of isolated handwritten Malayalam characters. Thirty three characters…”
    Get full text
    Conference Proceeding