Survey paper on various mining methods on multimedia Images
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 8, Issue 3
Abstract
Multimedia mining is a young but challenging subfield in data mining .Multimedia explanation represents an application of computer vision that presents the recognition of objects or ideas related to a multimedia document as a image. There is not unified conclusion in the concept, content and methods of Multimedia mining, Multimedia mining architecture and framework has to be further studied. there are various mining methods that we can apply on multimedia images like association rule mining, sequence mining, sequence pattern mining etc. In this survey paper we are focusing all this methods. We also discussed feature selection methods of various images.
Authors and Affiliations
Prateek Oswal, Divakar singh
Overview of the levels of ICT and information literacy skills in Canadas preservice teachers
To better understand the strong relationship between ICT and information literacy competencies, this short paper first describes their roles in the various education levels in Canada, including initial teacher training....
Performance Comparison Of Ann Classifiers For Sleep Apnea Detection Based On Ecg Signal Analysis Using Hilbert Transform
In this paper, a methodology for sleep apnea detection based on ECG signal analysis using Hilbert transform is proposed. The proposed work comprises a sequential procedure of preprocessing, QRS complex detection using Hi...
Factors Affecting Information and Communication Technology (ICT) Use by Southern Colleges Teachers in Balqa Applied University
This research was conducted to study the factors affecting the use of Information and Communication Technologies (ICTs) by Southern Colleges Teachers in Balqa applied university teachers. The results of this study indica...
COMPRO-MOTO: An efficient approach for identifying compromised nodes in wireless sensor networks.
Wireless sensor networks (WSNs) are exposed and being attacked by opponents as they are randomly deployed in open environments. Opponents can extract confidential information like secret keys by inserting their own nodes...
An Analysis of the PROMISE and ISBSG Software Engineering Data Repositories
There exist two ongoing large repositories of software projects in the software engineering community: the repository of the International Software Benchmarking Standards Group (ISBSG) and the Repository referred to as P...