Sciweavers

517 search results - page 68 / 104
» Adaptive Threshold Masking
Sort
View
ICAPR
2001
Springer
14 years 2 months ago
Character Extraction from Interfering Background - Analysis of Double-Sided Handwritten Archival Documents
The sipping of ink through the pages of certain double-sided handwritten documents after long periods of storage poses a serious problem to human readers or OCR systems. This pape...
Chew Lim Tan, Ruini Cao, Qian Wang, Peiyi Shen
BIOSTEC
2008
114views Healthcare» more  BIOSTEC 2008»
13 years 11 months ago
A Supervised Wavelet Transform Algorithm for R Spike Detection in Noisy ECGs
Abstract. The wavelet transform is a widely used pre-filtering step for subsequent R spike detection by thresholding of the coefficients. The time-frequency decomposition is indeed...
Gael de Lannoy, Arnaud de Decker, Michel Verleysen
CSREAPSC
2006
13 years 11 months ago
An Inexact Matching Method Based on Ontology and Semantic Distance for Resource Discovery and Interaction
- To overcome shortcomings of Exact Matching Method (EMM) and Substitute Description Method (SDM), an Inexact Matching Method Based on Ontology and Semantic Distance (OSDIMM) is in...
Tang Shancheng, Qian Yi, Wang Wei
JMM2
2007
127views more  JMM2 2007»
13 years 9 months ago
The Cut Detection Issue in the Animation Movie Domain
— In this paper we are proposing an improved cut detection algorithm adapted to the animation movies domain. A cut is the direct concatenation of two different shots and produces...
Bogdan Ionescu, Patrick Lambert, Didier Coquin, Va...
ECCC
2000
158views more  ECCC 2000»
13 years 9 months ago
On the Computational Power of Winner-Take-All
This article initiates a rigorous theoretical analysis of the computational power of circuits that employ modules for computing winner-take-all. Computational models that involve ...
Wolfgang Maass