Sciweavers

664 search results - page 7 / 133
» An objective way to evaluate and compare binarization algori...
Sort
View
ISCAS
2003
IEEE
134views Hardware» more  ISCAS 2003»
14 years 27 days ago
A hybrid system for automatic fingerprint identification
A hybrid fingerprint identification system is presented in this paper. The system consists of several steps: fingerprint enhancement, minutiae extraction, texture feature extracti...
Sanpachai Huvanandana, Settapong Malisuwan, Jakkap...
ER
2006
Springer
135views Database» more  ER 2006»
13 years 11 months ago
Towards Automatic Evaluation of Learning Object Metadata Quality
Thanks to recent developments on automatic generation of metadata and interoperability between repositories, the production, management and consumption of learning object metadata ...
Xavier Ochoa, Erik Duval
PAKDD
2009
ACM
103views Data Mining» more  PAKDD 2009»
14 years 2 months ago
Hot Item Detection in Uncertain Data
Abstract. An object o of a database D is called a hot item, if there is a sufficiently large population of other objects in D that are similar to o. In other words, hot items are ...
Thomas Bernecker, Hans-Peter Kriegel, Matthias Ren...
EVOW
2000
Springer
13 years 11 months ago
An Ant Algorithm with a New Pheromone Evaluation Rule for Total Tardiness Problems
Ant Colony Optimization is an evolutionary method that has recently been applied to scheduling problems. We propose an ACO algorithm for the Single Machine Total Weighted Tardiness...
Daniel Merkle, Martin Middendorf
JMIV
2008
214views more  JMIV 2008»
13 years 7 months ago
A Network Flow Algorithm for Reconstructing Binary Images from Continuous X-rays
Tomography is a powerful technique to obtain accurate images of the interior of an object in a nondestructive way. Conventional reconstruction algorithms, such as filtered backproj...
Kees Joost Batenburg