派博傳思國(guó)際中心

標(biāo)題: Titlebook: Applied Computation and Security Systems; Volume One Rituparna Chaki,Khalid Saeed,Nabendu Chaki Book 2015 Springer India 2015 Biometrics-ba [打印本頁(yè)]

作者: 撒謊    時(shí)間: 2025-3-21 17:55
書(shū)目名稱Applied Computation and Security Systems影響因子(影響力)




書(shū)目名稱Applied Computation and Security Systems影響因子(影響力)學(xué)科排名




書(shū)目名稱Applied Computation and Security Systems網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Applied Computation and Security Systems網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Applied Computation and Security Systems被引頻次




書(shū)目名稱Applied Computation and Security Systems被引頻次學(xué)科排名




書(shū)目名稱Applied Computation and Security Systems年度引用




書(shū)目名稱Applied Computation and Security Systems年度引用學(xué)科排名




書(shū)目名稱Applied Computation and Security Systems讀者反饋




書(shū)目名稱Applied Computation and Security Systems讀者反饋學(xué)科排名





作者: CRP743    時(shí)間: 2025-3-21 22:24
Iris Feature Extraction with the Influence of Its Diseases on the Resultsesults to the extended version of the paper. The answer to the main problem of the investigation is supposed to be given or at least discussed to know the relation between eye iris of sick and healthy eyes.
作者: 茁壯成長(zhǎng)    時(shí)間: 2025-3-22 02:22
2194-5357 .Includes theories and applications to provide design, analyThis book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, Indi
作者: 一個(gè)攪動(dòng)不安    時(shí)間: 2025-3-22 07:47

作者: 迅速成長(zhǎng)    時(shí)間: 2025-3-22 11:14
An Overlay Cognitive Radio Model Exploiting the Polarization Diversity and Relay Cooperationhe secondary transmitter, one of which acts as a relay to the primary user’s signal and cancels out the interference via space–time coding. Analytical results about the error performance and the outage probability for the scheme have been calculated. The performance degradation in the absence of perfect CSI has also been shown.
作者: 驚惶    時(shí)間: 2025-3-22 15:02
Book 2015omputation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high qualit
作者: Acupressure    時(shí)間: 2025-3-22 17:28

作者: Chemotherapy    時(shí)間: 2025-3-22 22:05
Study on Handover Mechanism in Cellular Network: An Experimental Approachancy for transceiver for better coverage. Through this exhaustive simulation, this paper aims to estimate the effect of factors influencing handoff as well as to test existing hypothesis about the handoff. The experimental results have disproved certain general conventions that are often assumed.
作者: Bernstein-test    時(shí)間: 2025-3-23 01:49

作者: Arboreal    時(shí)間: 2025-3-23 09:20

作者: 剛開(kāi)始    時(shí)間: 2025-3-23 10:30

作者: 上流社會(huì)    時(shí)間: 2025-3-23 17:38

作者: 節(jié)約    時(shí)間: 2025-3-23 22:04

作者: Medley    時(shí)間: 2025-3-23 22:51
Effect of Source Selection, Deployment Pattern, and Data Forwarding Technique on the Lifetime of DatIn this paper, we have studied the effect of certain non-electrical factors such as source selection, deployment pattern, packet size, and data forwarding technique on the performance of aggregation of a multi-sink WSN with varying degrees of aggregation.
作者: 出生    時(shí)間: 2025-3-24 06:15
Hassan Hamdoun,Aliyu Ahmad Usmanstrated in detail. Examples of how the minutiae are extracted from the processed retina are presented. The algorithm details together with its different stages, and their computer implementation will be given in the extended version of the work.
作者: 領(lǐng)先    時(shí)間: 2025-3-24 07:37
Engineering Applications of Neural Networksesults to the extended version of the paper. The answer to the main problem of the investigation is supposed to be given or at least discussed to know the relation between eye iris of sick and healthy eyes.
作者: consolidate    時(shí)間: 2025-3-24 12:13
Complex Layers of Formal Neuronsof identification, recognition expressions and detection of people features. The introduced algorithm concerns about finding four points around the mouth: two for corners, one situated in center on the border of upper lips and the last on the border of lower lips, which next are used for creating fe
作者: Metamorphosis    時(shí)間: 2025-3-24 15:13
Engineering Applications of Neural Networkses through many steps. In the very first step, thermal human face image is preprocessed and cropping of the facial region from the entire image is done. In the next step, scale invariant feature transform (SIFT) is used to extract the features from the cropped face region. The features obtained by S
作者: 小步舞    時(shí)間: 2025-3-24 22:23

作者: antiquated    時(shí)間: 2025-3-25 03:00
Engineering Applications of Neural Networksn in treating sick eyes with iris anomalies. This is actually specific as the iris code may (or may not) be affected in such situations. The paper introduces the basic steps in iris image and its main characteristics and features extraction leaving the detailed description of the algorithm and its r
作者: FECK    時(shí)間: 2025-3-25 06:17

作者: grotto    時(shí)間: 2025-3-25 10:03

作者: 有常識(shí)    時(shí)間: 2025-3-25 12:30

作者: 泥土謙卑    時(shí)間: 2025-3-25 16:30
Christoforos Nalmpantis,Dimitris Vrakasn an overlay CR scenario by exploiting the polarization diversity and relay cooperation. In this scheme, a dual-polarized antenna is incorporated at the secondary transmitter, one of which acts as a relay to the primary user’s signal and cancels out the interference via space–time coding. Analytical
作者: 杠桿    時(shí)間: 2025-3-25 20:16
Abdolreza Shirvani,B. John Oommenon reduces total number of transmissions in a WSN. Since transmitting energy is the most prominent component of energy consumption in a WSN, data aggregation reduces energy expenditure of the network and thereby enhances network lifetime. The nature of aggregation, however, may vary from one applica
作者: hermitage    時(shí)間: 2025-3-26 01:49
Beatriz A. Garro,Roberto A. Vazquezations are generally deployed in fields where uninterrupted supervisions are required. In WSN applications, thousands of energy-constrained sensor nodes are used to sense the data from the deployed environment and transmit the sensed data to the base station (BS). Recent advances in wireless sensor
作者: dura-mater    時(shí)間: 2025-3-26 04:27
Engineering Applications of Neural Networksted for randomly deployed wireless sensor network (WSN) in the presence of multipath Rician fading. Transmission based on HARQ and optimal power are two different promising approaches for reducing energy consumption in an energy constrained WSN. Optimal transmit power is the minimum power required t
作者: Terminal    時(shí)間: 2025-3-26 11:08
Prankit Gupta,Praminda Caleb-Sollyd comprise of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. The deployment of vehicular communication systems is strongly dependent upon their underlying security and privacy features. The effective trust management schemes for VANETs have been given the dire consequen
作者: 我吃花盤(pán)旋    時(shí)間: 2025-3-26 13:29

作者: 爆炸    時(shí)間: 2025-3-26 17:44

作者: 上漲    時(shí)間: 2025-3-26 22:05
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/a/image/159683.jpg
作者: entreat    時(shí)間: 2025-3-27 01:49
An Algorithm for Extracting Feature from Human Lipsof identification, recognition expressions and detection of people features. The introduced algorithm concerns about finding four points around the mouth: two for corners, one situated in center on the border of upper lips and the last on the border of lower lips, which next are used for creating feature vectors
作者: 壓碎    時(shí)間: 2025-3-27 07:58

作者: 陰郁    時(shí)間: 2025-3-27 13:18

作者: 細(xì)微差別    時(shí)間: 2025-3-27 13:59
https://doi.org/10.1007/978-81-322-1985-9Biometrics-based Authentication; Data Mining; Image Processing Techniques; Next Generation Networking; R
作者: 補(bǔ)充    時(shí)間: 2025-3-27 20:28

作者: exercise    時(shí)間: 2025-3-28 00:24
Complex Layers of Formal Neuronsof identification, recognition expressions and detection of people features. The introduced algorithm concerns about finding four points around the mouth: two for corners, one situated in center on the border of upper lips and the last on the border of lower lips, which next are used for creating feature vectors
作者: Asymptomatic    時(shí)間: 2025-3-28 03:01
An Algorithm for Extracting Feature from Human Lipsof identification, recognition expressions and detection of people features. The introduced algorithm concerns about finding four points around the mouth: two for corners, one situated in center on the border of upper lips and the last on the border of lower lips, which next are used for creating fe
作者: 蔑視    時(shí)間: 2025-3-28 06:15
Feature Selection using Particle Swarm Optimization for Thermal Face Recognitiones through many steps. In the very first step, thermal human face image is preprocessed and cropping of the facial region from the entire image is done. In the next step, scale invariant feature transform (SIFT) is used to extract the features from the cropped face region. The features obtained by S
作者: 一個(gè)姐姐    時(shí)間: 2025-3-28 12:06

作者: 思考    時(shí)間: 2025-3-28 14:57
Iris Feature Extraction with the Influence of Its Diseases on the Resultsn in treating sick eyes with iris anomalies. This is actually specific as the iris code may (or may not) be affected in such situations. The paper introduces the basic steps in iris image and its main characteristics and features extraction leaving the detailed description of the algorithm and its r
作者: PACK    時(shí)間: 2025-3-28 22:27
An Automatic Non-invasive System for Diagnosis of Tuberculosis treatment starts on time. Sometimes, it becomes difficult to arrange sufficient infrastructure for diagnosis of the disease in the remote areas of third world countries. Telemedicine partially solves the lack of physician and technicians in the pathological laboratories. The objective of this work
作者: Coeval    時(shí)間: 2025-3-28 22:59
Automated Vertebral Segmentation from CT Images for Computation of Lumbolumbar Anglen (LBP). There are five lumbar vertebrae (L1–L5). The angle formed between the slope of L1 and slope of L5 is the LL angle. This paper presents a computational technique for automated measurement of the LL angle from computerized tomography (CT) images using digital image processing techniques. The
作者: resilience    時(shí)間: 2025-3-29 06:43

作者: Ballerina    時(shí)間: 2025-3-29 10:47
An Overlay Cognitive Radio Model Exploiting the Polarization Diversity and Relay Cooperationn an overlay CR scenario by exploiting the polarization diversity and relay cooperation. In this scheme, a dual-polarized antenna is incorporated at the secondary transmitter, one of which acts as a relay to the primary user’s signal and cancels out the interference via space–time coding. Analytical
作者: 喚醒    時(shí)間: 2025-3-29 12:34
Effect of Source Selection, Deployment Pattern, and Data Forwarding Technique on the Lifetime of Daton reduces total number of transmissions in a WSN. Since transmitting energy is the most prominent component of energy consumption in a WSN, data aggregation reduces energy expenditure of the network and thereby enhances network lifetime. The nature of aggregation, however, may vary from one applica
作者: 使長(zhǎng)胖    時(shí)間: 2025-3-29 18:09

作者: 商品    時(shí)間: 2025-3-29 21:28

作者: ineptitude    時(shí)間: 2025-3-30 03:03

作者: obnoxious    時(shí)間: 2025-3-30 07:08
Study on Handover Mechanism in Cellular Network: An Experimental ApproachCall Admission Control (CAC) mechanism and evaluating performances for such algorithms are among the crucial challenges in the domain. Such technologies continually evolve with the changing communication paradigms. In this paper, we have investigated various parameters that impact performance at hom
作者: 音樂(lè)會(huì)    時(shí)間: 2025-3-30 09:19
Book 2015m cloud service design to transactional memory.?Part 5?in Volume II is on Cryptography with two book chapters in it.?Part?6?of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security
作者: 戰(zhàn)役    時(shí)間: 2025-3-30 15:34

作者: 情感脆弱    時(shí)間: 2025-3-30 20:16
Feature Selection using Particle Swarm Optimization for Thermal Face Recognitionnal feature extracted for better classification convergence. Finally, minimum distance classifier is used to find the class label of each testing images. Minimum distance classifier acts as an objective function for PSO. In this work, all the experiments have been performed on UGC-JU thermal face da
作者: HEED    時(shí)間: 2025-3-30 21:24
Flexible Cloud Architecture for Healthcare Applicationsvices has been proposed specifically for healthcare applications, which is capable of semi-structured healthcare data management and storing compatible with Health Level Seven (HL7) standard (Hennessy et al. in A framework and ontology for mobile sensor platforms in home health management, 2013; Liu




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
绍兴市| 满城县| 吉林省| 金堂县| 通渭县| 宜兰市| 西乌| 顺昌县| 松溪县| 陈巴尔虎旗| 和硕县| 昭觉县| 宁德市| 河西区| 正镶白旗| 昌吉市| 德化县| 台东县| 辰溪县| 柘城县| 大城县| 江津市| 诸城市| 南皮县| 湘阴县| 竹北市| 缙云县| 富民县| 柘荣县| 德安县| 洛川县| 黑龙江省| 田林县| 定边县| 勐海县| 衡水市| 正蓝旗| 张家港市| 内黄县| 宜昌市| 贵港市|