全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:... Debnath Bhattacharyya , Samir Kumar Bandyopadhyay , Tai-Hoon Kim
来源:[J].Frontiers of Computer Science(IF 0.298), 2017, Vol.11 (4), pp.717-727Springer
摘要:This paper propose a computerized method of magnetic resonance imaging (MRI) of brain binarization for the uses of preprocessing of features extraction and brain abnormality identification. One of the main problems of MRI binarization is that many pixels of brain part cannot be c...
作者:... Debnath Bhattacharyya , Samir Kumar Bandyopadhyay , Tai-Hoon Kim
来源:[J].IETE Journal of Research(IF 0.2), 2017, Vol.63 (6), pp.769-783Taylor & Francis
摘要:ABSTRACT(#br)In this paper, an iterative implement of level set methodology has been proposed for the precise segmentation of normal and abnormal tissues in magnetic resonance imaging (MRI) brain images. In this segmentation, the normal tissues such as WM (white matter), GM (grey...
作者:... Alejandra Guadalupe Silva Trujillo , Ana Lucila Sandoval Orozco , Tai-Hoon Kim
来源:[J].Sensors(IF 1.953), 2016, Vol.16 (11)DOAJ
摘要:Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymit...
作者:... Anderson Clayton Alves Nascimento , Luis Javier García Villalba , Tai-Hoon Kim
来源:[J].Sensors(IF 1.953), 2016, Vol.16 (11)DOAJ
摘要:Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are pri...
作者:... Alejandra Guadalupe Silva Trujillo , Ana Lucila Sandoval Orozco , Tai-hoon Kim
来源:[J].Sensors(IF 1.953), 2015, Vol.15 (2), pp.4052-4071DOAJ
摘要:In network communications, mixes provide protection against observers hiding the appearance of messages, patterns, length and links between senders and receivers. Statistical disclosure attacks aim to reveal the identity of senders and receivers in a communication network setting...
作者:... Fahad T. Bin Muhaya , Muhammad Sher , Tai-Hoon Kim
来源:[J].Sensors(IF 1.953), 2010, Vol.10 (11), pp.10146DOAJ
摘要:Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly div...
作者:Debnath Bhattacharyya , Tai-hoon Kim , Subhajit Pal
来源:[J].Sensors(IF 1.953), 2010, Vol.10 (12), pp.10506DOAJ
摘要:Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs). Wireless sensor networks with hundreds to thousands of sensor nodes can gather i...
作者:Shivali Goel , Jemal H. Abawajy , Tai-hoon Kim
来源:[J].Sensors(IF 1.953), 2010, Vol.10 (12), pp.11021DOAJ
摘要:Wireless sensor networks have attracted a lot of attention recently. In this paper, we develop a channel model based on the elliptical model for multipath components involving randomly placed scatterers in the scattering region with sensors deployed on a field. We verify that in ...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×