Skip to main content
    • by 
    •   8  
      Software MaintenanceDatabasesSoftware QualityReengineering
This paper sets out some findings of a research project carried out in private unaided schools in low-income areas of Hyderabad, India. The part of the research project documented here was designed to examine the question: ‘Is the... more
    • by 
    •   9  
      EconomicsAustrian EconomicsDeveloping CountryAndhra Pradesh
    • by 
    •   20  
      Long Term CareData AnalysisCase Study ResearchImplementation Science
    • by 
    •   17  
      Computer VisionImage ProcessingEye trackingHomeland Security
    • by 
    •   17  
      Information SystemsApproximation TheoryAlgorithmsArtificial Intelligence
    • by 
    •   13  
      RoutingResource AllocationRouting algorithmStability
Graphs are widely used to model complicated structures and link them with each other. Some of such structures are XML documents, social networks, and computer networks. Information and model extraction from graph databases is a graph... more
    • by 
    •   5  
      Graph Data MiningGraph matchingData MinigPattern Matching
Present paper describes the details of the study of the work that has been done in the field of text searching, a sub-division of Natural Language Processing (NLP) till date. The work in this project includes the study and analysis of... more
    • by 
    •   4  
      Computer ScienceAlgorithmsPattern MatchingNatural Language Processing(NLP)
We have developed new algorithms for efficient and flexible pattern-matching and pattern-discovery in multidimensional datasets. (A multidimensional dataset is simply any set of points in an N-dimensional space.) These algorithms could be... more
    • by 
    •   6  
      Computer ScienceInformation RetrievalData MiningData Compression
    • by 
    •   8  
      Cognitive ScienceComputer VisionAuthenticationFingerprint
    • by  and +1
    •   40  
      Information SystemsNeuroscienceAlgorithmsArtificial Intelligence
Geometric hashing is a model-based recognition technique based on matching of transformation-invariant object representations stored in a hash table. In the last decade, a number of enhancements have been suggested to the basic method... more
    • by 
    •   5  
      GeometryObject RecognitionHash TablePattern Matching
    • by 
    •   9  
      Principal Component AnalysisPattern RecognitionPattern MatchingInvariance
    • by 
    •   7  
      Cognitive SciencePattern RecognitionFeature SelectionPattern Matching
    • by 
    •   13  
      EngineeringComputer ScienceIndustrial DesignComputer Hardware
    • by 
    •   5  
      EngineeringBiometricsCryptographyPattern Matching
    • by 
    •   15  
      GeneticsComputer ScienceData MiningInformation Extraction
    • by 
    •   12  
      TransformationBest PracticesCloud ComputingBusiness Models
    • by 
    •   21  
      BusinessMachine LearningData MiningEngineering Management
    • by 
    •   7  
      SynchronizationCryptographyMobile ComputingAd Hoc Networks
The basic theory of Markov chains has been known to mathematicians and engineers for close to 80 years, but it is only in the past decade that it has been applied explicitly to problems in speech processing. One of the major reasons why... more
    • by 
    •   17  
      AlgorithmsArtificial IntelligenceMachine LearningSpeech Recognition
    • by 
    •   13  
      Computer ScienceResilienceProtocolsMathematical Analysis
    • by 
    •   13  
      Parallel ComputingComputer GraphicsMemory ManagementParallel Processing
    • by 
    •   5  
      Antenna arraysPattern MatchingNetwork TopologyS-parameters
    • by 
    •   18  
      Artificial IntelligenceComputer VisionMachine LearningModeling
Phoneme recognition can mean two things, conscious phoneme-naming and p reconscious phone-categorization. Phoneme naming is based on a (learned) label i n the mental lexicon. Tasks requiring phoneme awareness will therefore exhibit all... more
    • by 
    •   3  
      Computer ScienceWord RecognitionPattern Matching
The aim of the study was to define a simple system for the identification of unknown bodies by using CT images of frontal sinus and to discuss whether it was worth to add measurements to the system or not. The system was including simple... more
    • by 
    •   16  
      Forensic ScienceForensic PathologyMultidisciplinaryHumans
    • by 
    •   6  
      Information RetrievalPatent RetrievalPattern MatchingQuestion Answering
In recent years, the increase in cyber threats has raised many concerns about security and privacy in the digital world. However, new attack methods are often limited to a few core techniques. Here, in order to detect new threat patterns,... more
    • by 
    •   7  
      Information SecurityGraph SimilarityNetwork SecurityRandom Walks
This paper investigates the use of facial gestures for identity recogni- tion. This is the first time that such a quantitative evaluation is conducted, comparing the analyses of 2D versus 3D dynamic data of verbal and non- verbal facial... more
    • by 
    •   8  
      Face Recognitionhidden Markov modelPattern MatchingFeature Extraction
    • by 
    •   10  
      Pattern RecognitionDynamic programmingAlgorithmPattern Matching
    • by 
    •   5  
      Relational DatabaseTuring TestPattern MatchingScripting Language
Abstract: Palm vein authentication is one of the most reliable authentication. Which contain physiological body characteristics that can be used to distinguish between users. In this paper we represent in new approach for the personal... more
    • by 
    •   6  
      Pattern MatchingFeature ExtractionBiometric AuthenticationPalm-vein Recognition
    • by 
    •   3  
      Machine LearningGenetic AlgorithmPattern Matching
    • by 
    •   9  
      EngineeringMathematical SciencesComputer Aided Geometric DesignPattern Matching
    • by 
    •   10  
      User InterfaceGesture RecognitionRapid PrototypingUser interfaces
    • by 
    •   20  
      Cognitive ScienceDistributed ComputingRelational DatabaseGraph Theory
    • by 
    •   2  
      Pattern MatchingIce Cores
Herein, it is shown that by exploiting integral definitions of well known special functions, through generalizations and differentiations, broad classes of definite integrals can be solved in closed form or in terms of special functions.... more
    • by 
    •   5  
      Symbolic ComputationMathematical SciencesSpecial functionsPattern Matching
    • by 
    •   4  
      FPGAParallel ProcessingPattern MatchingString Matching
    • by 
    •   16  
      MathematicsComputer ScienceComputer VisionComputational Geometry
    • by 
    •   12  
      MicroelectronicSingular value decompositionNanolithographyEfficient Algorithm for ECG Coding
    • by 
    •   5  
      Computer ScienceComputer Science EducationPattern MatchingNovice Programmer
Content-based image retrieval consists in retrieving from an image database the most similar image with respect to a query, according to some similarity measure. This scenario has numerous specic applications that include bioinformatics... more
    • by 
    •   8  
      Information TheoryContent based image retrievalPattern MatchingSimilarity Search
    • by 
    •   5  
      MultidisciplinaryAppliedEfficient Algorithm for ECG CodingPattern Matching
    • by  and +2
    •   19  
      Discourse AnalysisArtificial IntelligenceInformation TechnologyCreativity
    • by 
    •   17  
      Information SystemsComputer VisionImage ProcessingComputational Geometry
    • by 
    •   19  
      Information SystemsAlgorithmsArtificial IntelligenceConfidence
Template Matching is one of the most basic techniques in computer vision, where the algorithm should search for a template image T in an image to analyze I. It is heavily used in signal, image and video processing. A lot of applications... more
    • by 
    •   10  
      Computer VisionPattern MatchingTemplate matchingImage matching