首页 > 最新文献

International Journal of Computer Science & Engineering Survey最新文献

英文 中文
Assessments Of Different Speeded Up Robust Features (SURF) Algorithm Resolution For Pose Estimation Of UAV 不同提速鲁棒特征(SURF)算法在无人机姿态估计中的应用
Pub Date : 2012-10-31 DOI: 10.5121/IJCSES.2012.3502
B. Sheta
The UAV industry is growing rapidly in an attempt to serve both military and commercial applications. A crucial aspect in the development of UAVs is the reduction of navigational sensor costs while maintaining accurate navigation. Advances in visual sensor solutions with traditional navigation sensors are proving to be significantly promising in replacing traditional IMU or GPS systems for many mission scenarios.
无人机工业正在快速增长,试图服务于军事和商业应用。无人机发展的一个关键方面是在保持精确导航的同时降低导航传感器成本。传统导航传感器的视觉传感器解决方案的进步被证明在许多任务场景中取代传统的IMU或GPS系统具有很大的前景。
{"title":"Assessments Of Different Speeded Up Robust Features (SURF) Algorithm Resolution For Pose Estimation Of UAV","authors":"B. Sheta","doi":"10.5121/IJCSES.2012.3502","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3502","url":null,"abstract":"The UAV industry is growing rapidly in an attempt to serve both military and commercial applications. A crucial aspect in the development of UAVs is the reduction of navigational sensor costs while maintaining accurate navigation. Advances in visual sensor solutions with traditional navigation sensors are proving to be significantly promising in replacing traditional IMU or GPS systems for many mission scenarios.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122318973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
LED-ID SYSTEM : COVERAGE AND FAST LINK RECOVERY TECHNIQUE Led-id系统:覆盖和快速链路恢复技术
Pub Date : 2012-10-31 DOI: 10.5121/IJCSES.2012.3501
Muhammad Shahin Uddin, Nargis Aktar, Y. Jang
Recently Light Emitting Diodes (LEDs) are considered to represent the next generation of lighting and communication technology. LED-ID (Light Emitting Diode – Identification) is one of the key technologies for identification, data transmission and illumination simultaneously. This is the new paradigm in the identification technology environment. LED-ID system typically needs line of sight (LOS) to support narrow FOV transceivers links to achieve high data rate but reduced the coverage, increase the disconnection rate of the link. Also when the receiver moves horizontally or vertically, in that case coverage also varied and LOS relies upon direct link between transmitter and receiver. Link recovery is a new challenge for reliable LED-ID system. Fast link recovery techniques are essential for the making the system robust. In this paper we discuss about the horizontal and vertical coverage variation in terms of received power and fast link recovery technique for the LED-ID system considering both LOS and NLOS reflection.
最近,发光二极管(led)被认为是下一代照明和通信技术的代表。LED-ID (Light Emitting Diode - Identification)是同时实现识别、数据传输和照明的关键技术之一。这是识别技术环境中的新范式。LED-ID系统通常需要支持视距(LOS)窄视场的收发器链路才能实现高数据速率,但这降低了覆盖范围,增加了链路的断线率。此外,当接收器水平或垂直移动时,在这种情况下覆盖范围也会变化,LOS依赖于发射器和接收器之间的直接连接。链路恢复对LED-ID系统的可靠性提出了新的挑战。快速链路恢复技术是保证系统鲁棒性的关键。本文从接收功率和快速链路恢复技术两方面讨论了考虑LOS和NLOS反射的LED-ID系统的水平和垂直覆盖变化。
{"title":"LED-ID SYSTEM : COVERAGE AND FAST LINK RECOVERY TECHNIQUE","authors":"Muhammad Shahin Uddin, Nargis Aktar, Y. Jang","doi":"10.5121/IJCSES.2012.3501","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3501","url":null,"abstract":"Recently Light Emitting Diodes (LEDs) are considered to represent the next generation of lighting and communication technology. LED-ID (Light Emitting Diode – Identification) is one of the key technologies for identification, data transmission and illumination simultaneously. This is the new paradigm in the identification technology environment. LED-ID system typically needs line of sight (LOS) to support narrow FOV transceivers links to achieve high data rate but reduced the coverage, increase the disconnection rate of the link. Also when the receiver moves horizontally or vertically, in that case coverage also varied and LOS relies upon direct link between transmitter and receiver. Link recovery is a new challenge for reliable LED-ID system. Fast link recovery techniques are essential for the making the system robust. In this paper we discuss about the horizontal and vertical coverage variation in terms of received power and fast link recovery technique for the LED-ID system considering both LOS and NLOS reflection.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117346285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DVR-BASED MANET ROUTING PROTOCOLS TAXONOMY 基于dvr的manet路由协议分类
Pub Date : 2012-10-31 DOI: 10.5121/IJCSES.2012.3504
M. Debbarma, S. K. Sen, Sudipta Roy, Guru Nānak
In ad hoc network, each node is equipped with a wireless transmitter and receiver (transceiver) that is powered by a battery. Two nodes willing to communicate with each other need to be either in the direct common range of each other or should be helped by other nodes to act as routers forwarding their packets. A node in a Mobile Ad hoc Network (MANET) acts as dual role of a host and a router as well. Designing routing algorithm for MANET is a difficult job compared to designing routing algorithm for wired networks. The important challenges in routing in MANET are due to same intrinsic characteristic of MANET, like limited battery power, highly dynamic nature of network topology, limited bandwidth, asymmetric links, scalability, mobility of nodes etc. In this paper, we analyzed DVR based routing protocols aiming to find suitable path through special neighbours between hops in MANET. This paper classified various routing protocols based on DVR for MANET and compared on the characteristics (routing metrics), performance and complexity.
在自组织网络中,每个节点都配备了一个由电池供电的无线发射器和接收器(收发器)。愿意相互通信的两个节点要么需要在彼此的直接公共范围内,要么需要其他节点帮助充当转发其数据包的路由器。移动自组织网络(MANET)中的节点同时扮演着主机和路由器的双重角色。与有线网络路由算法的设计相比,MANET路由算法的设计是一项困难的工作。在MANET中路由的重要挑战是由于MANET相同的固有特性,如有限的电池电量,网络拓扑的高度动态性,有限的带宽,非对称链路,可扩展性,节点的移动性等。本文分析了基于DVR的路由协议,旨在通过MANET中跳间的特殊邻居找到合适的路径。本文对基于DVR的MANET路由协议进行了分类,比较了各种路由协议的特点(路由指标)、性能和复杂度。
{"title":"DVR-BASED MANET ROUTING PROTOCOLS TAXONOMY","authors":"M. Debbarma, S. K. Sen, Sudipta Roy, Guru Nānak","doi":"10.5121/IJCSES.2012.3504","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3504","url":null,"abstract":"In ad hoc network, each node is equipped with a wireless transmitter and receiver (transceiver) that is powered by a battery. Two nodes willing to communicate with each other need to be either in the direct common range of each other or should be helped by other nodes to act as routers forwarding their packets. A node in a Mobile Ad hoc Network (MANET) acts as dual role of a host and a router as well. Designing routing algorithm for MANET is a difficult job compared to designing routing algorithm for wired networks. The important challenges in routing in MANET are due to same intrinsic characteristic of MANET, like limited battery power, highly dynamic nature of network topology, limited bandwidth, asymmetric links, scalability, mobility of nodes etc. In this paper, we analyzed DVR based routing protocols aiming to find suitable path through special neighbours between hops in MANET. This paper classified various routing protocols based on DVR for MANET and compared on the characteristics (routing metrics), performance and complexity.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130228829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Second Generation Curvelet Transforms Vs Wavelet transforms and Canny Edge Detector for Edge Detection from WorldView-2 data 第二代曲线变换与小波变换及Canny边缘检测器在WorldView-2数据边缘检测中的应用
Pub Date : 2012-08-31 DOI: 10.5121/IJCSES.2012.3401
M. Elhabiby, A. Elsharkawy, N. El-Sheimy
Edge detection is an important assignment in image processing, as it is used as a primary tool for pattern recognition, image segmentation and scene analysis. Simply put, an edge detector is a high-pass filter that can be applied for extracting the edge points within an image. Edge detection in the spatial domain is accomplished through convolution with a set of directional derivative masks in this domain. On one hand, the popular edge detection spatial operators such as; Roberts, Sobel, Prewitt, and Laplacian are all defined on a 3 by 3 pattern grid, which is efficient and easy to apply. On the other hand, working in the frequency domain has many advantages, starting from introducing an alternative description to the spatial representation and providing more efficient and faster computational schemes with less sensitivity to noise through high filtering, de-noising and compression algorithms. Fourier transforms, wavelet and curvelet transform are among the most widely used frequency-domain edge detection from satellite images. However, the Fourier transform is global and poorly adapted to local singularities. Some of these draw backs are solved by the wavelet transforms especially for singularities detection and computation. In this paper, the relatively new multi-resolution technique, curvelet transform, is assessed and introduced to overcome the wavelet transform limitation in directionality and scaling. In this research paper, the assessment of second generation curvelet transforms as an edge detection tool will be introduced and compared to traditional edge detectors such as wavelet transform and Canny Edge detector. Second generation curvelet transform provides optimally sparse representations of objects, which display smoothness except for discontinuity along the curve with bounded curvature. Preliminary results show the power of curvelet transform over the wavelet transform through the detection of nonvertical oriented edges, with detailed detection of curves and circular boundaries, such as non straight roads and shores. Conclusions and recommendations are given with respect to the suitability; accuracy and efficiency of the curvelet transform method compared to the other traditional methods
边缘检测是图像处理中的一项重要任务,是模式识别、图像分割和场景分析的主要工具。简单地说,边缘检测器是一个高通滤波器,可以用于提取图像中的边缘点。空间域的边缘检测是通过在该域中与一组方向导数掩模进行卷积来完成的。一方面,常用的边缘检测空间算子如;Roberts, Sobel, Prewitt和Laplacian都是在一个3 × 3的网格模式上定义的,这是高效且易于应用的。另一方面,在频域工作有很多优点,从引入空间表示的替代描述开始,通过高滤波、去噪和压缩算法提供更高效、更快的计算方案,对噪声的敏感度更低。傅里叶变换、小波变换和曲线变换是应用最广泛的卫星图像频域边缘检测方法。然而,傅里叶变换是全局的,对局部奇异点的适应能力较差。用小波变换解决了这些缺点,特别是在奇异点检测和计算方面。为了克服小波变换在方向性和尺度上的局限性,本文评估并引入了一种相对较新的多分辨率技术——曲线变换。本文对第二代曲线变换作为边缘检测工具进行了评价,并与小波变换、Canny边缘检测等传统边缘检测方法进行了比较。第二代曲线变换提供了物体的最优稀疏表示,除了沿有界曲率曲线的不连续外,还表现出平滑性。初步结果表明,通过检测非垂直定向边缘,以及对曲线和圆形边界(如非直线道路和海岸)的详细检测,曲线变换优于小波变换。就适宜性提出结论和建议;与其他传统方法相比,曲线变换方法的精度和效率更高
{"title":"Second Generation Curvelet Transforms Vs Wavelet transforms and Canny Edge Detector for Edge Detection from WorldView-2 data","authors":"M. Elhabiby, A. Elsharkawy, N. El-Sheimy","doi":"10.5121/IJCSES.2012.3401","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3401","url":null,"abstract":"Edge detection is an important assignment in image processing, as it is used as a primary tool for pattern recognition, image segmentation and scene analysis. Simply put, an edge detector is a high-pass filter that can be applied for extracting the edge points within an image. Edge detection in the spatial domain is accomplished through convolution with a set of directional derivative masks in this domain. On one hand, the popular edge detection spatial operators such as; Roberts, Sobel, Prewitt, and Laplacian are all defined on a 3 by 3 pattern grid, which is efficient and easy to apply. On the other hand, working in the frequency domain has many advantages, starting from introducing an alternative description to the spatial representation and providing more efficient and faster computational schemes with less sensitivity to noise through high filtering, de-noising and compression algorithms. Fourier transforms, wavelet and curvelet transform are among the most widely used frequency-domain edge detection from satellite images. However, the Fourier transform is global and poorly adapted to local singularities. Some of these draw backs are solved by the wavelet transforms especially for singularities detection and computation. In this paper, the relatively new multi-resolution technique, curvelet transform, is assessed and introduced to overcome the wavelet transform limitation in directionality and scaling. In this research paper, the assessment of second generation curvelet transforms as an edge detection tool will be introduced and compared to traditional edge detectors such as wavelet transform and Canny Edge detector. Second generation curvelet transform provides optimally sparse representations of objects, which display smoothness except for discontinuity along the curve with bounded curvature. Preliminary results show the power of curvelet transform over the wavelet transform through the detection of nonvertical oriented edges, with detailed detection of curves and circular boundaries, such as non straight roads and shores. Conclusions and recommendations are given with respect to the suitability; accuracy and efficiency of the curvelet transform method compared to the other traditional methods","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128210311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems 针对入侵检测系统的弱点、漏洞和规避策略
Pub Date : 2012-08-31 DOI: 10.5121/IJCSES.2012.3402
Hossein Jadidoleslamy
One of most important existent issues in information security application domain is Intrusion Detection System (IDS); IDS is a defensive-aggressive system to protect information, verifying and responding to occurring attacks on computer systems and networks. This paper discusses different topics including presenting some strategies against IDSs to passing from them; this leads to improving detection level and performance of IDS; also, this paper considers some intrusion tools, new attacks patterns and tracking prevention techniques. In addition, it discusses vulnerabilities, security holes and IDSs' structural and systemic problems to eliminating defects, reducing penetrates and correcting their behavior. Finally, it leads to increasing the functionality coefficient of IDSs, promoting the security level of computer systems and networks, increasing the trust of authorized users. So, the proposed methods in this paper can apply to improving the IDSs by using inverse engineering methods.
信息安全应用领域存在的一个重要问题是入侵检测系统(IDS);IDS是一种防御-攻击系统,用于保护信息,验证和响应对计算机系统和网络的攻击。本文讨论了不同的主题,包括提出了一些防御入侵防御的策略;从而提高了入侵检测系统的检测水平和性能;此外,本文还讨论了一些入侵工具、新的攻击模式和跟踪防御技术。此外,还讨论了漏洞、安全漏洞和ids的结构性和系统性问题,以消除缺陷,减少渗透,纠正其行为。最后,提高入侵防御系统的功能系数,提高计算机系统和网络的安全水平,增加授权用户的信任。因此,本文所提出的方法可以应用于利用逆工程方法改进ids。
{"title":"Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems","authors":"Hossein Jadidoleslamy","doi":"10.5121/IJCSES.2012.3402","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3402","url":null,"abstract":"One of most important existent issues in information security application domain is Intrusion Detection System (IDS); IDS is a defensive-aggressive system to protect information, verifying and responding to occurring attacks on computer systems and networks. This paper discusses different topics including presenting some strategies against IDSs to passing from them; this leads to improving detection level and performance of IDS; also, this paper considers some intrusion tools, new attacks patterns and tracking prevention techniques. In addition, it discusses vulnerabilities, security holes and IDSs' structural and systemic problems to eliminating defects, reducing penetrates and correcting their behavior. Finally, it leads to increasing the functionality coefficient of IDSs, promoting the security level of computer systems and networks, increasing the trust of authorized users. So, the proposed methods in this paper can apply to improving the IDSs by using inverse engineering methods.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130889484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
HYBRID TECHNIQUE FOR KNOWLEDGE REPRESENTATION & A COMPARATIVE STUDY 混合知识表示技术&比较研究
Pub Date : 2012-08-31 DOI: 10.5121/IJCSES.2012.3404
Poonam Tanwar, T. V. Prasad, K. Datta
Knowledge representation (KR) and inference mechanism are most desirable thing to make the system intelligent. System is known to an intelligent if its intelligence is equivalent to the intelligence of human being for a particular domain or general. Because of incomplete ambiguous and uncertain information the task of making intelligent system is very difficult. The objective of this paper is to present the hybrid KR technique for making the system effective & Optimistic. The requirement for (effective & optimistic) is because the system must be able to reply the answer with a confidence of some factor. This paper also presents the comparison between various hybrid KR techniques with the proposed one.
知识表示和推理机制是实现系统智能化的关键。如果一个系统的智能在某一特定领域或一般情况下等同于人类的智能,那么这个系统就是智能的。由于信息的不完全性、模糊性和不确定性,使得智能系统的设计非常困难。本文的目的是提出混合氪技术,使系统有效和乐观。对(有效和乐观)的要求是因为系统必须能够以某种因素的置信度来回答答案。本文还比较了各种混合氪金技术与本文提出的混合氪金技术。
{"title":"HYBRID TECHNIQUE FOR KNOWLEDGE REPRESENTATION & A COMPARATIVE STUDY","authors":"Poonam Tanwar, T. V. Prasad, K. Datta","doi":"10.5121/IJCSES.2012.3404","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3404","url":null,"abstract":"Knowledge representation (KR) and inference mechanism are most desirable thing to make the system intelligent. System is known to an intelligent if its intelligence is equivalent to the intelligence of human being for a particular domain or general. Because of incomplete ambiguous and uncertain information the task of making intelligent system is very difficult. The objective of this paper is to present the hybrid KR technique for making the system effective & Optimistic. The requirement for (effective & optimistic) is because the system must be able to reply the answer with a confidence of some factor. This paper also presents the comparison between various hybrid KR techniques with the proposed one.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116518985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on Target Tracking Techniques in Wireless Sensor Networks 无线传感器网络中目标跟踪技术综述
Pub Date : 2012-08-31 DOI: 10.5121/IJCSES.2012.3408
K. Ramya, K. Kumar, V. Rao
Target Tracking as it moves through a sensor network has become an increasingly important application in Wireless Sensor Networks. This paper examines some of the target tracking techniques in use today. An analysis of each technique is presented along with it advantages, problems and possible improvements. There are seven main categories explored in this paper. The survey promotes overview of recent research literature along with their performance comparison and evaluation.
目标在传感器网络中的运动跟踪已经成为无线传感器网络中越来越重要的应用。本文研究了目前使用的一些目标跟踪技术。分析了每种技术的优点、存在的问题和可能的改进。本文主要探讨了七个类别。调查促进了近期研究文献的概述,并对其进行了性能比较和评价。
{"title":"A Survey on Target Tracking Techniques in Wireless Sensor Networks","authors":"K. Ramya, K. Kumar, V. Rao","doi":"10.5121/IJCSES.2012.3408","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3408","url":null,"abstract":"Target Tracking as it moves through a sensor network has become an increasingly important application in Wireless Sensor Networks. This paper examines some of the target tracking techniques in use today. An analysis of each technique is presented along with it advantages, problems and possible improvements. There are seven main categories explored in this paper. The survey promotes overview of recent research literature along with their performance comparison and evaluation.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121246470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
WEB SEARCH RESULT CLUSTERING - A REVIEW 网络搜索结果聚类——综述
Pub Date : 2012-08-31 DOI: 10.5121/IJCSES.2012.3407
Kishwar Sadaf, Mansaf Alam
The ever-increasing information on the web with its heterogeneity and dynamism needs an information retrieval system which serves searcher’s ambiguous, ill-formed, short queries with relevant result in a precise way. Web search result clustering has been emerged as a method which overcomes these drawbacks of conventional information retrieval (IR) systems. It is the clustering of results returned by the search engines into meaningful, thematic groups. This paper gives a succinct overview and categorizes various techniques that have been used in clustering of web search results.
网络上不断增加的信息具有异构性和动态性,需要一个信息检索系统能够准确地为搜索者的歧义、格式不良、简短的查询提供相关的结果。网络搜索结果聚类是一种克服传统信息检索系统缺点的方法。它是将搜索引擎返回的结果聚类成有意义的主题组。本文给出了一个简洁的概述,并分类了在网络搜索结果聚类中使用的各种技术。
{"title":"WEB SEARCH RESULT CLUSTERING - A REVIEW","authors":"Kishwar Sadaf, Mansaf Alam","doi":"10.5121/IJCSES.2012.3407","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3407","url":null,"abstract":"The ever-increasing information on the web with its heterogeneity and dynamism needs an information retrieval system which serves searcher’s ambiguous, ill-formed, short queries with relevant result in a precise way. Web search result clustering has been emerged as a method which overcomes these drawbacks of conventional information retrieval (IR) systems. It is the clustering of results returned by the search engines into meaningful, thematic groups. This paper gives a succinct overview and categorizes various techniques that have been used in clustering of web search results.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114797587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Computer-Aided Diagnosis of Thyroid Nodule: A Review 甲状腺结节的计算机辅助诊断综述
Pub Date : 2012-08-31 DOI: 10.5121/IJCSES.2012.3406
D. Koundal, Savita Gupta, Sukhwinder Singh
Diagnostic imaging is an important tool in medical science due to the constrained observations of the expert and uncertainties in medical knowledge. A thyroid ultrasound is a non-invasive imaging study used to detect and classify abnormalities of the thyroid gland. Computerized system is a valuable and beneficial means for feature extraction and classification of thyroid nodule in order to eliminate operator dependency and to improve the diagnostic accuracy. The aim of this paper is to review existing approaches to the automatic classification of nodules in thyroid ultrasound images, highlighting the keypoints and main differences between the used strategies. The aim of this paper is to review existing approaches for the diagnosis of Nodules in thyroid ultrasound images with their performance measures.
由于专家观察的局限性和医学知识的不确定性,诊断成像在医学科学中是一种重要的工具。甲状腺超声是一种用于检测和分类甲状腺异常的非侵入性影像学研究。计算机化系统对甲状腺结节的特征提取和分类是一种有价值和有益的手段,可以消除对操作者的依赖,提高诊断的准确性。本文的目的是回顾现有的方法自动分类结节甲状腺超声图像,突出的关键点和使用策略之间的主要区别。本文的目的是回顾现有的方法诊断结节甲状腺超声图像及其性能指标。
{"title":"Computer-Aided Diagnosis of Thyroid Nodule: A Review","authors":"D. Koundal, Savita Gupta, Sukhwinder Singh","doi":"10.5121/IJCSES.2012.3406","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3406","url":null,"abstract":"Diagnostic imaging is an important tool in medical science due to the constrained observations of the expert and uncertainties in medical knowledge. A thyroid ultrasound is a non-invasive imaging study used to detect and classify abnormalities of the thyroid gland. Computerized system is a valuable and beneficial means for feature extraction and classification of thyroid nodule in order to eliminate operator dependency and to improve the diagnostic accuracy. The aim of this paper is to review existing approaches to the automatic classification of nodules in thyroid ultrasound images, highlighting the keypoints and main differences between the used strategies. The aim of this paper is to review existing approaches for the diagnosis of Nodules in thyroid ultrasound images with their performance measures.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132807940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A SURVEY ON VARIOUS APPROACHES OF TEXT EXTRACTION IN IMAGES 图像文本提取的几种方法综述
Pub Date : 2012-08-31 DOI: 10.5121/IJCSES.2012.3403
T. Santhanam
Text Extraction plays a major role in finding vital and valuable information. Text extraction involves detection, localization, tracking, binarization, extraction, enhancement and recognition of the text from the given image. These text characters are difficult to be detected and recognized due to their deviation of size, font, style, orientation, alignment, contrast, complex colored, textured background. Due to rapid growth of available multimedia documents and growing requirement for information, identification, indexing and retrieval, many researches have been done on text extraction in images.Several techniques have been developed for extracting the text from an image. The proposed methods were based on morphological operators, wavelet transform, artificial neural network,skeletonization operation,edge detection algorithm, histogram technique etc. All these techniques have their benefits and restrictions. This article discusses various schemes proposed earlier for extracting the text from an image. This paper also provides the performance comparison of several existing methods proposed by researchers in extracting the text from an image.
文本提取在寻找重要和有价值的信息方面起着重要的作用。文本提取包括对给定图像中的文本进行检测、定位、跟踪、二值化、提取、增强和识别。这些文本字符由于其大小、字体、样式、方向、对齐、对比度、复杂的颜色、纹理背景的偏差而难以被检测和识别。由于现有多媒体文档的快速增长以及对信息、识别、索引和检索的需求日益增长,人们对图像中的文本提取进行了大量的研究。已经开发了几种从图像中提取文本的技术。该方法基于形态学算子、小波变换、人工神经网络、骨架化操作、边缘检测算法、直方图技术等。所有这些技术都有其优点和局限性。本文讨论了前面提出的从图像中提取文本的各种方案。本文还提供了研究人员提出的几种从图像中提取文本的方法的性能比较。
{"title":"A SURVEY ON VARIOUS APPROACHES OF TEXT EXTRACTION IN IMAGES","authors":"T. Santhanam","doi":"10.5121/IJCSES.2012.3403","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3403","url":null,"abstract":"Text Extraction plays a major role in finding vital and valuable information. Text extraction involves detection, localization, tracking, binarization, extraction, enhancement and recognition of the text from the given image. These text characters are difficult to be detected and recognized due to their deviation of size, font, style, orientation, alignment, contrast, complex colored, textured background. Due to rapid growth of available multimedia documents and growing requirement for information, identification, indexing and retrieval, many researches have been done on text extraction in images.Several techniques have been developed for extracting the text from an image. The proposed methods were based on morphological operators, wavelet transform, artificial neural network,skeletonization operation,edge detection algorithm, histogram technique etc. All these techniques have their benefits and restrictions. This article discusses various schemes proposed earlier for extracting the text from an image. This paper also provides the performance comparison of several existing methods proposed by researchers in extracting the text from an image.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114748525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
期刊
International Journal of Computer Science & Engineering Survey
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1