Category Archives: Articles

short review and analysis of latest advances in support vector machine for Alzheimer’s disease detection

Automated and accurate detection of Alzheimer’s disease (AD) is of importance for the analysis. Various brain imaging techniques are now available in hospitals. Recently, researchers have proposed many different and innovative methods based on support vector machine (SVM) and computer vision to improve the performance of automatic classification of AD and healthy brain images.This review focused on discussing the strengths and limitations of earlier classification techniques. Besides analyzing these literatures, the paper also provides a critical evaluation of the surveyed literature that reveals new hotspots of research. Continue reading

Posted in Articles | Comments Off

A review of attribute relationship exploration and exploitation for improved object recognition

Recently, attribute-based representation has been extensively researched in the literature of computer vision due to its wide applications. While enjoying advantages of attributes such as clear semantic meaning and well generality in depicting differen… Continue reading

Posted in Articles | Comments Off

DESIGN AND ANALYSIS OF UNWANTED VOICE CALLS AND DISTRIBUTED COMPUTING IN ATM NETWORKS

In the modern age we will aware about the ATM and cash deposit machine. However the problem like fake note detection is not preferably solved. A simple algorithm to be implemented in the ATM to detect the fake notes in ATM across the country. The algorithm makes ATM more efficient and reliable system. We present a new error control approach for continuous media communication protocols. Since continuous media data are inherently bursty these protocols commonly uses a control time for the first packet in a burst to ensure continuous play back in the presence of delay jitter.

 

 

The retransmission scheme which is called slack automatic repeat request is based on appropriately extending the control time for the first packet in a burst to allow for the timely retransmission of last packets i.e. before the lost packet is due for playback. We present simulation results that demonstrate the feasibility and effectiveness of this retransmission scheme under a realistic scenario for an optical FDDI networks.

Continue reading

Posted in Articles | Comments Off

Haze Weather Monitoring via EBPSK Satellite Signals

A haze weather monitoring method using satellite signal of EBPSK modulation is constructed in this paper. The core of the method is a three-dimensional (3D) water vapor reconstruction model. The distances between satellites and ground-based receivers are known. In the calculation process, troposphere delay could be solved by differential process. The troposphere delay is used for water vapor distribution calculation on the signal path. Raw water vapor data is received through the array of land-based receiver. The boundary values are presumed known, the 3D distribution in of water vapor is calculated by the 3D haze weather monitoring model. In order to improve the accuracy of the calculation, the differential method and average method are used as error reduction strategies. The validity of 3D water vapor reconstruction model is proved by the calculation example of land-based EBPSK satellite array receivers.

Continue reading

Posted in Articles | Comments Off

PROBANDO LA SUBIDA DE ARTICULOS

askkakdaksd iasd ais dido ijasisdjapd asd ajd jaspd ajdo asj asdjpoasd paspospasdpoasd aspjpaspd pasd ajsdjasjd jas ajdspojdsadsjasdjasjpoaspasdds asdpasdjpoaspoaspoasdpoasdpoasjsadpoasdj apdsoaps daspoas oas dpoasjdpoasd poaspoasdpoasd oa sdpoas jpajspadpasdp  psod Continue reading

Posted in Articles | Comments Off

Construct DNA Symmetric Encryption Based On Fragment Assembly

DNA cryptography is a new born information security field and has been the international frontier of cryptography emerged with the constantly invasion of traditional cryptography and    improvement    of    research    on    DNA computing and bio-technology. Based on the problem of fragment stitching, this work was made for introducing the background of DNA cryptography, and briefly describing the features of DNA molecular, key biotechnologies and related software. Then we study the difficult biological problem which is the key and basic part in designing of DNA encryption. We put forward own difficult problem which is to assembly when overlaps are destroyed and prove its difficulty with examples. After analysis of encoding of DNA and mechanism of symmetric encryption, we design a symmetric system using the technology of DNA digital coding and DNA fragment assembly. And the security analysis proves that the scheme has high confidential strength. Continue reading

Posted in Articles | Comments Off

“Flame Retardanat Plasticizers and Low Smoke Additives Increase the Oxygen Index and Reduces the Smoke values”.

AbstractThe use of low melting sulphate glasses and metal chelates as fire and smoke retarder additives for PVC has been described [1]. The results obtained with several metal containing addivtives, flame retardent plasticizers, low melting sulphate gl… Continue reading

Posted in Articles | Comments Off

An educational evaluation model reflecting practical experiences of first-line educators

 In this study, we propose a comprehensive adjustable educational evaluation model, which involves the practical experiences and preferences of first-line educators. We define and devise some useful concepts and methods such as the Original natural preference degree. The detailed process is presented with an illustrative numerical example. The method proposed in this study obeys the Monotonicity principle which can show the effectiveness and efficiency in the evaluation model.

Continue reading

Posted in Articles | Comments Off