De-noising the image using DBST-LCM-CLAHE: A deep learning approach
Histogram Equalization (HE) is one of the most popular techniques for this purpose. Most
histogram equalization techniques, including Contrast Limited Adaptive Histogram …
histogram equalization techniques, including Contrast Limited Adaptive Histogram …
[PDF][PDF] A review on image forgery & its detection procedure
V Dhir - International Journal of Advanced Research in …, 2017 - academia.edu
Image forgery and image forgery detection are emerging as well as hot research topics
among researchers. In today's digital scenario, images are playing a major role in our day to …
among researchers. In today's digital scenario, images are playing a major role in our day to …
Application of binary PSO for public cloud resources allocation system of video on demand (VoD) services
Video streaming, whether on demand or live, has become one of the most popular internet
applications. However, financial investments required for it is a severe problem since it …
applications. However, financial investments required for it is a severe problem since it …
[PDF][PDF] Real-time QoS Monitoring for Big Data Analytics in Mobile Environment: an Overview
F **ao, P Wainaina - scholar.archive.org
The laid out service delivery techniques, models and the aforesaid monitoring strategies for
the mobile environment big data acts as the platform for the big resources application. The …
the mobile environment big data acts as the platform for the big resources application. The …
A LITERATURE REVIEW: EFFICIENT VM MIGRATION TECHNIQUES FOR ENERGY REDUCTION IN CLOUD COMPUTING.
Broadly speaking cloud computing is nothing but a highly'utilitarian'orientation of IT services
where users benefited on a pay-as-you go basis. In a way it enables the hosting of pervasive …
where users benefited on a pay-as-you go basis. In a way it enables the hosting of pervasive …