Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
The Segmentation of Lumen Boundaries at Intravascular Ultrasound Images
The Active Contour Model (ACM) with Local Image Fitting Energy Minimization (LIFEM) method which has been widely used in medical imaging technique as it always produces computationally efficient for subregions with continuous boundaries maintains and deals with the boundary regularization property and sub-pixel accuracy.
LOCAL AND GLOBAL HISTOGRAM MATCHING FOR ENHANCING IMAGE QUALITY USING SPATIAL REPRESENTATION
Novel local and global histrogram method for enhancing image quality using biometric finger input as one model evaluating the system is proposed.
DETECTION OF CHROMOSOME ABNORMALITY USING IMAGE PROCESSING TECHNIQUE FOR HUMAN CHARACTERISTICS
The proposed system classifies the human chromosomes and detects chromosomal abnormalities automatically without human supervision and Linear Vector Quantization classifier is used for classification.
Probiotics and Antibiotics in Periodontal Therapy- A Review
Over the years, many chemotherapeutic agent including antimicrobial host modulation agents have been used to achieve better results in the treatment of periodontal disease.
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
In the proposed work Multi Factor Authentication (MFA) and secure session key generation using Gaussian distribution to reduce the attacks caused by the attackers are proposed.
Secured Message Transfer through QR Code Process for Document Authentication Systems
Survey on Privacy Preserving in Social Networks
The generalization techniques of anonymous social networking data with sufficient privacy for harsh environments while preserving the validity of the data are described, relying on technical analysis and link social networks to disclose sensitive user information.
PERFORMANCE ANALYSIS OF MULTIUSER DETECTION TECHNIQUES FOR WIRELESS COMMUNICATION SYSTEMS
This paper proposes a performance analysis of multiuser detection techniques for wireless communication systems and proposes a technique of resource allocation technique, which separates the absolute accessible signaling measurements into channels and afterward allots these channels to various users.
Difference Convex Programming based TSVM to Detect Phishing Pages
The result is to use C TSVM detect phishing sites to improve performance, such as classification TSVM should be more flexible, which makes learning CTSVM, in order to more efficiently.