|
|
|
Mofleh Hannuf AlRowaily, Hamzah Arof and Imanurfatiehah Ibrahim
This paper presents an automatic correction method for luminosity and contrast variation in fundus images. Sixty retina or fundus images with different levels of reflectance are selected from online databases and used to assess the effectiveness of the p...
ver más
|
|
|
|
|
|
|
Gianluca Barbera, Luiz Araujo and Silvia Fernandes
Social Media Analytics (SMA) is more and more relevant in today?s market dynamics. However, it is necessary to use it wisely, either in promoting any kind of product/brand, or interacting with customers. This requires its effective understanding and moni...
ver más
|
|
|
|
|
|
|
Xiu Fang, Suxin Si, Guohao Sun, Quan Z. Sheng, Wenjun Wu, Kang Wang and Hang Lv
Crowdsourcing integrates human wisdom to solve problems. Tremendous research efforts have been made in this area. However, most of them assume that workers have the same credibility in different domains and workers complete tasks independently. This lead...
ver más
|
|
|
|
|
|
|
Clément Bonet, Titouan Vayer, Nicolas Courty, François Septier and Lucas Drumetz
In the context of optimal transport (OT) methods, the subspace detour approach was recently proposed by Muzellec and Cuturi. It consists of first finding an optimal plan between the measures projected on a wisely chosen subspace and then completing it in...
ver más
|
|
|
|
|
|
|
Hossein R. Najafabadi, Tiago G. Goto, Mizael S. Falheiro, Thiago C. Martins, Ahmad Barari and Marcos S. G. Tsuzuki
Topology optimization (TO) of engineering products is an important design task to maximize performance and efficiency, which can be divided into two main categories of gradient-based and non-gradient-based methods. In recent years, significant attention ...
ver más
|
|
|
|
|
|
|
Wafa Shafqat, Yung-Cheol Byun and Namje Park
Recommendation systems aim to decipher user interests, preferences, and behavioral patterns automatically. However, it becomes trickier to make the most trustworthy and reliable recommendation to users, especially when their hardest earned money is at ri...
ver más
|
|
|
|
|
|
|
Bin Jiang and Terry Slocum
The Earth?s surface or any territory is a coherent whole or subwhole, in which the notion of ?far more small things than large ones? recurs at different levels of scale ranging from the smallest of a couple of meters to the largest of the Earth?s surface...
ver más
|
|
|
|
|
|
|
Angga Wijaya
Pág. 133 - 139
Classical cryptography is study of securing a secret message (plaintext) into a hidden message (ciphertext) which in the process changes each character. The process of converting plaintext into ciphertext is called encryption, the reverse process is call...
ver más
|
|
|
|
|
|
|
Feras Zenalden,Suhaidi Hassan,Adib Habbal
Pág. pp. 33 - 46
Device-to-Device (D2D) communication is an important component of the 5G mobile networks. D2D communication enables users to communicate either directly without network assistance or with minimum signalling information through a base station (BS). Hence,...
ver más
|
|
|
|
|
|
|
Chang Jin Kiat,Daisy Mui Hung Kee,Aiy Siew A/P Ah Chai,Ghalia Jamal,Soo Mei Chen,Tiong Zih Lin
Pág. 137 - 143
KFC or also known as Kentucky Fried Chicken is one of the most leading fast food restaurants around the world. KFC that originally from America has thrived around the world including Malaysia and Kuwait. Although it is an advanced company, it still has s...
ver más
|
|
|
|