Second Generation Curvelet Transforms Vs Wavelet transforms and Canny Edge Detector for Edge Detection from WorldView-2 data |
Mohamed Elhabiby, Ahmed Elsharkawy and Naser El-Sheimy , University of Calgary,Alberta |
Volume : 3 volume number : 4 pdf |
Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems |
Hossein Jadidoleslamy,The University of Guilan, Iran |
Volume : 3 volume number : 4 pdf |
A Survey On Various Approaches Of Text Extraction In Images |
C.P. Sumathi1, T. Santhanam2 and G.Gayathri Devi1, 1SDNB Vaishnav College for Women, India and 2DG Vaishnav College for Men, India |
Volume : 3 volume number : 4 pdf |
Hybrid Technique For Knowledge Representation & A Comparative Study |
POONAM TANWAR 1, T. V. PRASAD1, KAMLESH DATTA2, 1 Lingaya's University, India and 2National Institute of Technology, India |
Volume : 3 volume number : 4 pdf |
A Survey on Terrorist Network Mining: Current Trends and Opportunities |
Nisha Chaurasia, Mradul Dhakar, Akhilesh Tiwari and R. K. Gupta, MITS Gwalior, India |
Volume : 3 volume number : 4 pdf |
Computer-Aided Diagnosis of Thyroid Nodule: A Review |
Deepika Koundal, Savita Gupta and Sukhwinder Singh, Panjab University, India |
Volume : 3 volume number : 4 pdf |
Web Search Result Clustering- A Review |
Kishwar Sadaf and Mansaf Alam, Jamia MIllia Islamia, India |
Volume : 3 volume number : 4 pdf |
A Survey on Target Tracking Techniques in Wireless Sensor Networks |
K. Ramya, K. Praveen Kumar, and V. Srinivas Rao,VR Siddhartha Engineering College, India |
Volume : 3 volume number : 4 pdf |