Learn More
It is important to guarantee the privacy and the security of the users in the telecare medicine information system. Recently, Wu et al.’s proposed an authentication scheme for mobile devices in telecare medicine information system. They added the pre-computing idea within the communication process to avoid the time-consuming exponential computations. They(More)
With the fast development of wireless communication technologies and semiconductor technologies, the wireless sensor network (WSN) has been widely used in many applications. As an application of the WSN, the wireless medical sensor network (WMSN) could improve health-care quality and has become important in the modern medical system. In the WMSN,(More)
This paper explores an image processing application of optimization techniques which entails interpreting noisy sensor data. The application is a generalization of image correlation; we attempt to find the optimal gruence which matches two overlapping gray scale images corrupted with noise. Both tabu search and genetic algorithms are used to find the(More)
Bombesin receptors are overexpressed on a variety of human tumors like prostate, breast, and lung cancer. The aim of this study was to develop radiolabeled (Indium-111, Lutetium-177, and Yttrium-90) bombesin analogues with affinity to the three bombesin receptor subtypes for targeted radiotherapy. The following structures were synthesized:(More)
Due to avoiding the key escrow problem in the identity-based cryptosystem, certificateless public key cryptosystem (CLPKC) has received a significant attention. As an important part of the CLPKC, the certificateless authenticated key agreement (CLAKA) protocol also received considerable attention. Most CLAKA protocols are built from bilinear mappings on(More)
A new wavelet-based method for the compression of electrocardiogram (ECG) data is presented. A discrete wavelet transform (DWT) is applied to the digitized ECG signal. The DWT coefficients are first quantized with a uniform scalar dead-zone quantizer, and then the quantized coefficients are decomposed into four symbol streams, representing a binary(More)