Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2012
A Rule Based Approach for Implementation of Bangla to English Translation
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 13–18https://doi.org/10.1109/ACSAT.2012.98An initiative to model a Bangla to English (B2E) translation using Natural Language Processing (NLP) was proposed in our previous research. Here we implemented the model with a lot of modifications. A very successful translator is observed in Anubadok ...
- ArticleNovember 2012
Digital Image Watermarking, Analysis of Current Methods
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 324–329https://doi.org/10.1109/ACSAT.2012.90The rapid evolution in data transmission by the wide use of the internet, as provided an urgent need to prevent penetration and maintain the confidentiality of this data through the applying of some techniques to hide data within the carrier for example,...
- ArticleNovember 2012
High Image Quality Watermarking Model by Using Genetic Algorithm
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 127–132https://doi.org/10.1109/ACSAT.2012.89Imperceptibility or quality for digital image watermarking represents one of the most important requirements for any digital watermarking system. Many studies try to enhance the quality by using different techniques and methods. In this study, Genetic ...
- ArticleNovember 2012
Ranking Table for Cluster Head Selection of Wireless Sensor Network
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 100–104https://doi.org/10.1109/ACSAT.2012.81Power consumption is always an important element for Wireless Sensor Network (WSN). The energy is the main constraint should be considered when designing the algorithm, protocol or the methods. Clustering is one of the effective methods to use in ...
- ArticleNovember 2012
Partial Encryption of Wavelet Compressed Images
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 393–396https://doi.org/10.1109/ACSAT.2012.80This work focuses its goal on the reduction in computational cost for image encryption. Bit selection for partial encryption is applied in this paper to show haw can match applications requirements without the overhead of full encryption. The suggested ...
-
- ArticleNovember 2012
Move Prediction in Start Kicking of Sepak Takraw Game Using Dempster-Shafer Theory
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 376–381https://doi.org/10.1109/ACSAT.2012.8This paper presents Dempster-Shafer theory for move prediction in start kicking of the bicycle kick of sepak takraw game. Sepak takraw is a highly complex net-barrier kicking sport that involves dazzling displays of quick reflexes, acrobatic twists, ...
- ArticleNovember 2012
Automatic Guitar Music Transcription
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 197–202https://doi.org/10.1109/ACSAT.2012.78This paper presents a system that helps in automatically generating guitar tablatures and musical scores based on musical audio data. Information gathered from the audio consists of pitch, onsets and durations, chords, and beat and tempo. Major issues ...
- ArticleNovember 2012
A New Approach to Feature Selection in Handwritten Farsi/Arabic Character Recognition
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 506–511https://doi.org/10.1109/ACSAT.2012.77Feature extraction and feature selection are very important steps in pattern recognition systems. However, finding an optimal, effective, and robust feature set is usually a difficult task. In this paper, with the use of a comprehensive study on offline ...
- ArticleNovember 2012
Identifying the Dominant Language of Web Page Using Supervised N-grams
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 344–348https://doi.org/10.1109/ACSAT.2012.74Natural language processing is an emerging technology in linguistic industry and an aid to human-computer interaction in computer science. Language identification, on the other hand, is a form of pattern recognition that helps to identify predefined ...
- ArticleNovember 2012
Hybrid and Multilevel Segmentation Technique for Medical Images
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 442–445https://doi.org/10.1109/ACSAT.2012.73In this paper, we present a novel, fast, hybrid and bi-level segmentation technique uniquely developed for segmentation of medical images. Medical images are generally characterized by multiple regions, and weak edges. When regions in medical images are ...
- ArticleNovember 2012
Border Detection of Ventricle Wall Motion in Echocardiographic Images: A Survey
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 486–490https://doi.org/10.1109/ACSAT.2012.72Echocardiography imaging is one of the most widely used diagnostic tests for cardiovascular diseases which allow direct visualization of cardiac structure and ventricles wall motion. It can provide useful information, including the size and shape of the ...
- ArticleNovember 2012
Removing Shadow for Hand Segmentation Based on Background Subtraction
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 481–485https://doi.org/10.1109/ACSAT.2012.71Hand segmentation is an important stage for accurate hand detection and background subtraction is one of the best solutions to detect the hand motion accurately, however the shadow is the critical problem in this technique which is not easy to separate ...
- ArticleNovember 2012
Single Image Reconstruction of Human Heart Surface with Specular Reflection Remover
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 476–480https://doi.org/10.1109/ACSAT.2012.693D reconstruction with specular reflection remover is one of the vital and robust tools that provide aid in many fields, especially medical filed. This article presents a novel method for reconstruction a real human heart surface from a single view ...
- ArticleNovember 2012
A Robust Feature Extraction and Selection Method for the Recognition of Lymphocytes versus Acute Lymphoblastic Leukemia
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 330–335https://doi.org/10.1109/ACSAT.2012.62An essential part of the diagnosis and treatment of leukemia is the visual examination of the patient's peripheral blood smear under the microscope. Morphological changes in the white blood cells are commonly used to determine the nature of the ...
- ArticleNovember 2012
Binary Morphological Model in Refining Local Fitting Active Contour in Segmenting Weak/Missing Edges
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 446–451https://doi.org/10.1109/ACSAT.2012.60Medical images are known to have poor quality which leads to difficulty in vision and segmentation process. Mainly, noise and intensity in homogeneity are two main characteristics that lead to gaps (missing at edges) at the boundary of the desired ...
- ArticleNovember 2012
Preprocessing Algorithms for Arabic Handwriting Recognition Systems
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 318–323https://doi.org/10.1109/ACSAT.2012.59Preprocessing is one of basic phases of handwritten text recognition and it is crucial to reach high recognition rate. In this paper, we present several algorithms for Arabic handwritten text which are based on inherent properties of Arabic writing. ...
- ArticleNovember 2012
Analysis of Thumbprint Recognition in Different Bit Levels
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 192–196https://doi.org/10.1109/ACSAT.2012.53In this paper, a preliminary analysis of thumbprint recognition in different bit levels is presented. A digital image consists of m x n pixels and each pixel is represented by gray level value. In an 8-bits gray level image, the gray level value range ...
- ArticleNovember 2012
Hybrid Intelligent Technique for Text Categorization
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 238–245https://doi.org/10.1109/ACSAT.2012.50Text categorization is the task in which documents are classified into one or more of predefined categories based on their contents. This paper shows that the proposed system consists of three main steps: document representation, classifier construction ...
- ArticleNovember 2012
Immune Based Clustering for Medical Diagnostic Systems
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesPages 372–375https://doi.org/10.1109/ACSAT.2012.42It has recently been shown that Artificial Immune Systems (AIS) can be successfully implemented as biologically inspired systems. The Artificial Immune Network (AIN) is one of the computationally intelligent systems that are inspired by the processes of ...