: The increasing number of digitized texts presently available notably on the Web has developed an acute need in text mining techniques. Clustering systems are used more and more o...
Abdelmalek Amine, Zakaria Elberrichi, Michel Simon...
: Finite Radon Transform mapper has the ability to increase orthogonality of sub-carriers, it is non sensitive to channel parameters variations, and has a small constellation energ...
: Telemedicine refers to the use of information and communication technology to provide and support health care mainly for the purpose of providing consultation. It is also a way t...
Ahasanun Nessa, Moshaddique Al Ameen, Sana Ullah, ...
: A Burg technique is employed to model the long wavelength localization and imaging problem. A Burg method is used as a high resolution and stable technique. The idea of in-line h...
: Transformation functions utilizing the global information content of an input image have been long serving contrast enhancement by stretching the dynamic range of intensity level...
Md. Hasanul Kabir, Mohammad Abdullah-Al-Wadud, Oks...
: Intrusion detection system is one of the possible solutions to timely detect the intrusions and alarm for appropriate action. So far many intrusion detection systems have been pr...
: In this paper we present the conception and the implementation of a speech processing interface for cochlea prosthesis. This module is based on a numerical speech processing algo...
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
: In this paper we have made an algorithm to diagnose the Constitutional Jaundice (Dubin-Johnson, Gilbert and Rotor syndrome) the algorithm is decomposed into two parts: 1) using W...
: Steganography is the art and science of concealing information in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. It is an application under informati...