6 Hits in 4.2 sec

Face Matching for Post-Disaster Family Reunification

Eugene Borovikov, Szilard Vajda, Girish Lingappa, Sameer Antani, George Thoma
2013 2013 IEEE International Conference on Healthcare Informatics  
In this article, we review relevant research and present our approach to robust nearduplicate image detection as well as face matching.  ...  unlikely in a disaster setting.  ...  Table I exhibits the results for full image matching using the Haar wavelet based method used in near-duplicate detection.  ... 
doi:10.1109/ichi.2013.23 dblp:conf/ichi/BorovikovVLAT13 fatcat:tipst4jspjbytcrmlubuaww4au

Table of Contents

2018 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)  
Using Layered Morphing 261 A Novel Approach To Hide Audio Data In Cover Image Using Rgb Color Based Key Positioning Image Steganography 262 Medical Image Security With Cheater Identification  ...  Data Technologies : A Survey 219 Survey On Frequent Item-Set Mining Approaches In Market Basket Analysis 220 Privacy-Preserving Outsourced Mining Of D-Eclat Association Rules On Vertically Partitioned  ... 
doi:10.1109/iccubea.2018.8697655 fatcat:jvjgmcrh3fhxtkf4kyydawnkiq

Big Data Analytics and Machine Learning of Harbour Craft Vessels to Achieve Fuel Efficiency: A Review

Zhi Yung Tay, Januwar Hadi, Favian Chow, De Jin Loh, Dimitrios Konovessis
2021 Journal of Marine Science and Engineering  
One of the key strategies is to build a vibrant maritime industry with the use of innovation and digital technologies as well as intelligent systems.  ...  The digitization of the shipping industry not only provides a competitive edge to the shipping business model but also enhances ship operational and energy efficiency.  ...  Haar Wavelet Transformation The Haar wavelet transformation (HWT) is a discrete wavelet transform system used to denoise and detects outliers.  ... 
doi:10.3390/jmse9121351 fatcat:cki4nzavy5bbnckd75raczjwpq

"A veritable bucket of facts" origins of the data base management system

Thomas Haigh
2006 SIGMOD record  
This work has been partially supported by the European Commission under the contract IST-FP6-004559 (project SODIUM: Service Oriented Development in a Unified fraMework).  ...  Technological change also played a part.  ...  Constructing Optimal Wavelet Synopses The wavelet transform is a powerful tool for constructing concise synopses of massive multi-dimensional data sets and rapidly changing data streams, while at the same  ... 
doi:10.1145/1147376.1147382 fatcat:pk5odqlhqnctdepmcrfsriputi

Specification Of Security Enablers For Data Management

Marko Vukolic
2016 Zenodo  
Chapter 6 introduces a generic state-transfer tool for partitioned state-mac [...]  ...  Chapter 4 introduces a novel model for developing reliable distributed protocols called XFT, as well as the rst state-machine replication protocol in this model -XPaxos.  ...  Data deduplication. The implementation of a data deduplication mechanism in this system necessitates an additional procedure to test whether a new uploaded file is a duplicate or not.  ... 
doi:10.5281/zenodo.263831 fatcat:ksk4ze2tuncfbexjzsorjnoabe

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+36 others)
2016 unpublished
a transform in Equation (2) and Equation (3) are called integer Haar wavelet transform or S transform.  ...  For DE domain, Tian [10] proposed a lossless DE algorithm based on the 1-D Haar wavelet transformation from 2003.  ...  Hai-Rui Yang received the BS degree in software engineering in 2012 from the Dalian University of Technology, with A * i .  ...