思考 发表于 2025-3-28 14:57:32

Iris Feature Extraction with the Influence of Its Diseases on the Resultsn in treating sick eyes with iris anomalies. This is actually specific as the iris code may (or may not) be affected in such situations. The paper introduces the basic steps in iris image and its main characteristics and features extraction leaving the detailed description of the algorithm and its r

PACK 发表于 2025-3-28 22:27:43

An Automatic Non-invasive System for Diagnosis of Tuberculosis treatment starts on time. Sometimes, it becomes difficult to arrange sufficient infrastructure for diagnosis of the disease in the remote areas of third world countries. Telemedicine partially solves the lack of physician and technicians in the pathological laboratories. The objective of this work

Coeval 发表于 2025-3-28 22:59:53

Automated Vertebral Segmentation from CT Images for Computation of Lumbolumbar Anglen (LBP). There are five lumbar vertebrae (L1–L5). The angle formed between the slope of L1 and slope of L5 is the LL angle. This paper presents a computational technique for automated measurement of the LL angle from computerized tomography (CT) images using digital image processing techniques. The

resilience 发表于 2025-3-29 06:43:00

http://reply.papertrans.cn/16/1597/159683/159683_44.png

Ballerina 发表于 2025-3-29 10:47:34

An Overlay Cognitive Radio Model Exploiting the Polarization Diversity and Relay Cooperationn an overlay CR scenario by exploiting the polarization diversity and relay cooperation. In this scheme, a dual-polarized antenna is incorporated at the secondary transmitter, one of which acts as a relay to the primary user’s signal and cancels out the interference via space–time coding. Analytical

唤醒 发表于 2025-3-29 12:34:11

Effect of Source Selection, Deployment Pattern, and Data Forwarding Technique on the Lifetime of Daton reduces total number of transmissions in a WSN. Since transmitting energy is the most prominent component of energy consumption in a WSN, data aggregation reduces energy expenditure of the network and thereby enhances network lifetime. The nature of aggregation, however, may vary from one applica

使长胖 发表于 2025-3-29 18:09:11

http://reply.papertrans.cn/16/1597/159683/159683_47.png

商品 发表于 2025-3-29 21:28:03

http://reply.papertrans.cn/16/1597/159683/159683_48.png

ineptitude 发表于 2025-3-30 03:03:58

http://reply.papertrans.cn/16/1597/159683/159683_49.png

obnoxious 发表于 2025-3-30 07:08:36

Study on Handover Mechanism in Cellular Network: An Experimental ApproachCall Admission Control (CAC) mechanism and evaluating performances for such algorithms are among the crucial challenges in the domain. Such technologies continually evolve with the changing communication paradigms. In this paper, we have investigated various parameters that impact performance at hom
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Applied Computation and Security Systems; Volume One Rituparna Chaki,Khalid Saeed,Nabendu Chaki Book 2015 Springer India 2015 Biometrics-ba