The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Indirect immunofluorescence (IIF) with HEp-2 cells has been used to detect antinuclear auto-antibodies (ANA) for diagnosing systemic autoimmune diseases. The aim of this study is to develop an automatic scheme to identify the fluorescence pattern of HEp-2 cell in the IIF images. By using the previously proposed two-staged segmentation method, the similarity-based watershed algorithm with marker techniques...
Extracting classification rules from data is an important task of data mining and is gaining considerable attention in recent years. This paper comprises classification of different types of rule extraction algorithm and their comparative study by considering their advantages separately. These Ant Colony based algorithms called as Ant_Miner have been successfully implemented in various fields such...
Recent developments in applied and heuristic optimization methods used for feature extraction from satellite images have been strongly influenced and inspired by natural and biological system. The findings of recent studies are showing strong evidence to the fact that some aspects of the biogeography can be applied to solve specific problems in science and engineering. The algorithm based on this...
Techniques for information hiding and steganography are becoming increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages is also becoming considerably more difficult. In this paper, we describe a universal approach to steganalyse the least significant bit steganography method for detecting the presence of hidden messages embedded within...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.