Learn More
Recently great attention has been given to point-of-failure swap rerouting, an efficient technique for routing in presence of transient failures. According to this technique, a message follows the normal routing table information unless the next hop has failed; in this case, it is redirected towards a precomputed link, called swap; once this link has been(More)
Research is taking place to find effective algorithms for content-based image representation and description. There is a substantial amount of algorithms available that use visual features (color, shape, texture). Shape feature has attracted much attention from researchers that there are many shape representation and description algorithms in literature.(More)
(Dis) similarity measure is a significant component of vector model. In content based image retrieval the compatibility of (dis)similarity measure and representation technique is very important for effective and efficient image retrieval. In order to find a suitable dis-similarity measure for a particular representation technique experimental comparison is(More)
—Fingerprint is one of the most extensively used biometric systems for authentication in areas where security is of high importance. This is due to their permanence, accuracy and reliability. However, extracting features out of degraded fingerprints is the most challenging in order to obtain high fingerprint matching performance. This paper intends to(More)
In image retrieval most of the existing visual content based representation methods are usually application dependent or non robust, making them not suitable for generic applications. These representation methods use visual contents such as colour, texture, shape, size etc. Human image recognition is largely based on shape, thus making it very appealing for(More)
Road region recognition is a main feature that is gaining increasing attention from intellectuals because it helps autonomous vehicle to achieve a successful navigation without accident. However, different techniques based on camera sensor have been used by various researchers and outstanding results have been achieved. Despite their success, environmental(More)
Recommender systems are software applications that belong to a class of personalized information filtering technologies that aim to support decision making in large information space. There are various techniques being used to achieve this goal in traditional and mobile recommender systems. The recommender systems techniques are usually classified in four(More)
This paper introduces an object shape representation using Kernel Density Feature Points Estimator (KDFPE). In this method we obtain the density of feature points within defined rings around the centroid of the image. The Kernel Density Feature Points Estimator is then applied to the vector of the image. KDFPE is invariant to translation, scale and(More)
We consider the problem of computing the best swap edges of a shortest-path tree Tr rooted in r. That is, given a single link failure: if the path is not affected by the failed link, then the message will be delivered through that path; otherwise, we want to guarantee that, when the message reaches the edge (u, v) where the failure has occurred, the message(More)