DIGITAL IMAGE PROCESSING TECHNIQUES FOR DETECTION AND REMOVAL OF NOISE IN IMAGES IMPLEMENTING BLIND SOURCE SEPARATION
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 8
Abstract
In different fields, the problem of Blind Source Separation (BSS) is known as a collection of linear combinations of unknown sources and worse the coefficients of the linear combinations that are unknown. The main problem is to estimate the matrix of the combination coefficients (mixing matrix) and to reconstruct the sources according to it. The quality of separation of sources from mixtures dramatically is done by exploiting the quality of sparsity of sources, whereby the sources are properly represented according to some collection of signals. There are two main approaches to the “blind source separation” problem solution they are clustering and ICA (independent component analysis).
Authors and Affiliations
K Devaki Devi , Dr GN Swamy
Various Schemes to Speed up the PC during Virus Scan
The current threat landscape is changing and we have seen a large volume of new viruses captured by security vendors each day. Customers always complain that anti-virus software slow down their computers by consuming muc...
Security Enhancement Using Mutual Authentication in Existing CDMA Systems
Abstract— Even though CDMA2000 wireless networks are being widely deployed as a cellular digital standard around the world, it has some hidden vulnerabilities concerned with security issues. The existing CDMA systems use...
An Enhanced k-means algorithm to improve the Efficiency Using Normal Distribution Data Points
Clustering is one of the unsupervised learning method in which a set of essentials is separated into uniform groups. The k-means method is one of the most widely used clustering techniques for various applications. This...
The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the pro...
Hierarchical classification of web content using Naïve Bayes approach
This paper explores the use of hierarchical structure to classify a heterogeneous collection of web pages. In the hierarchical classification, a model learns to distinguish a second level category from all other categori...