A Wavelet Domain Approach Based On DT-CWT For Satellite Image Processing
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
A DT-CWT-based nonlocal-means-based RE (DT-CWTNLM-RE) strategy is proposed, utilizing the DT-CWT, Lanczos addition, and NLM. Note that DT-CWT is almost move invariant and directional specific. In addition, DTCWT safeguarded the typical properties of impeccable reproduction with very much adjusted recurrence reactions. Significantly, DT-CWT gives promising results after the change of the wavelet coefficients and gives less curios, as contrasted and conventional DWT. Since the Lanczos channel offer less associating, sharpness, and negligible ringing, thusly, it a decent decision for RE. NLM is utilized to further upgrade the execution of DT-CWT-NLM-RE by diminishing the ancient rarities. The outcomes (for spatial RE of optical pictures) are contrasted and the best performing strategies.
Authors and Affiliations
G. Pavankumar, K. Govinda Rajulu
Verification of Metadata by Encryption for Data Storage Security in Cloud
Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus...
A New Key Management Protocol for WMN’s And Ad Hoc Networks
A foremost challenge in developing systems is to overcome the difficulties of the theoretically incomplete communication from the group to the sender, the unattainability of a completely trusted key generation center...
Design and Development of Mobile Assisted Language Learning (MALL) application for English Language using Android Push Notification Services
The pervasive nature of the mobile devices and the wide array of mobile learning applications enables the acceptance of mobile devices as an indispensable component in the current pedagogical learner-centric mode of...
Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks
We describe a Resource Depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the sam...
A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network
Media access control (MAC) layer is a very important layer in wireless sensor networks. The media access control data communication protocol sub layer also known as the medium access control. It provide addressing an...