[Lecture Notes in Computer Science] Computational Intelligence and Security Volume 3801 || RD-Based Seeded Region Growing for Extraction of Breast Tumor in an Ultrasound Volume
β Scribed by Hao, Yue; Liu, Jiming; Wang, Yuping; Cheung, Yiu-ming; Yin, Hujun; Jiao, Licheng; Ma, Jianfeng; Jiao, Yong-Chang
- Book ID
- 120936532
- Publisher
- Springer Berlin Heidelberg
- Year
- 2005
- Weight
- 750 KB
- Category
- Article
- ISBN
- 3540315993
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp
The Icica 2010 Conference Provided A Forum For Engineers And Scientists In Academia, Industry, And Government To Address The Most Innovative Research And Development Including Technical Challenges And Social, Legal, Political, And Economic Issues, And To Present And Discuss Their Ideas, Results, Wor
2.1 Text Summarization βText summarization is the process of distilling the most important information from a source (or sources) to produce an abridged version for a particular user (or users) and task (or tasks)β [3]. Basic and classical articles in text summarization appear in βAdvances in automa