现代教育与计算机科学期刊
期刊
会议
图书
作者:Sunanda Gupta , Naresh Grover , Zaheeruddin
来源:[J].International Journal of Information Engineering and Electronic Business(IJIEEB), 2016, Vol.8 (2), pp.30-36MECS
摘要:This paper studies on image registration using Ant Colony Optimization technique of the medical imag-es. Ant Colony Optimization algorithm has ability of global optimization and facilitates quick search of opti-mal parameters for image registration. In this paper, a modified Ant ...
作者:Nureni A. Yekini. , Adetokunbo O. Oloyede , Akinwole K. Agnes ...
来源:[J].International Journal of Information Engineering and Electronic Business(IJIEEB), 2016, Vol.8 (3), pp.41-46MECS
摘要:This paper presents automobile tracking system with audio surveillance using GPS and GSM Module to provide an alternative solution to security challenges experienced by car owner, and to develop a system that can track the location of vehicles. We make use of Microcontroller Unit...
作者:Carlo Ciulla , Farouk Yahaya , Edmund Adomako ...
来源:[J].International Journal of Information Engineering and Electronic Business(IJIEEB), 2016, Vol.8 (1), pp.1-10MECS
摘要:This paper presents a novel and unreported approach developed to filter T2-weighetd Magnetic Resonance Imaging (MRI). The MRI data is fitted with a parametric bivariate cubic Lagrange polynomial, which is used as the model function to build the continuum into the discrete samples...
作者:Sahar A. El_Rahman , Sahar S. Shabanah
来源:[J].International Journal of Information Engineering and Electronic Business(IJIEEB), 2016, Vol.8 (3), pp.1-10MECS
摘要:Accreditation is considered as one of the major aspects of ABET, where educational institutions continuously develop the quality of academic programs to achieve it. For the most part of this continuous development needs, the programs determine definite and measured objectives for...
作者:Pankaj Kumar , C.P. Katti
来源:[J].International Journal of Information Engineering and Electronic Business(IJIEEB), 2016, Vol.8 (2), pp.66-75MECS
摘要:An SQL injection attack compromises the interactive web based applications, running database in the backend. The applications provide a form to accept user input and convert it into the SQL statement and fire the same to the database. The attackers change the structure of SQL sta...
作者:Manpreet kaur , Hardeep Singh
来源:[J].International Journal of Information Engineering and Electronic Business(IJIEEB), 2016, Vol.8 (3), pp.31-40MECS
摘要:As cloud computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. Number of users used cloud to store their data. In general terms means encrypted form hackers can easily hack or modify the data because there is no security while uploa...
作者:A. Anbarasa Pandian , R. Balasubramanian
来源:[J].International Journal of Information Engineering and Electronic Business(IJIEEB), 2016, Vol.8 (4), pp.63-72MECS
摘要:The problem of searching a digital image in a very huge database is called Content Based Image Retrieval (CBIR). Shape is a significant cue for describing objects. In this paper, we have developed a shape feature extraction of MRI brain tumor image retrieval. We used T1 weig...
作者:Aderonke A. Kayode , Babajide S.Afolabi , Bolanle O. Ibitoye
来源:[J].International Journal of Information Engineering and Electronic Business(IJIEEB), 2016, Vol.8 (3), pp.57-66MECS
摘要:Breast cancer is the most common cancer found in women in the world. Mammography has become indispensable for early detection of breast cancer. Radiologists interpret patients' mammograms by looking for some significant visual features for decision making. These features could ha...
作者:Siddu P. Algur , Prashant Bhat , Narasimha H Ayachit
来源:[J].International Journal of Information Engineering and Electronic Business(IJIEEB), 2016, Vol.8 (2), pp.59-65MECS
摘要:Computer applications and business administrations have gained significant importance in higher education. The type of education, students get in these areas depend on the geo-economical and the social demography. The choice of a institution in these area of higher education depe...
作者:Prashant Maurya , Amanpreet Kaur
来源:[J].International Journal of Information Engineering and Electronic Business(IJIEEB), 2016, Vol.8 (2), pp.46-58MECS
摘要:A wireless sensor network (WSN) is an emerging field comprising of sensor nodes as basic units. These sensor nodes have limited resources like power, memory etc. WSNs can be used to monitor the remote areas where recharging or replacing the battery power of sensor nods is not pos...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×