Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Menaka, R.
- Computer Reinforced Analysis for Ischemic Stroke Recognition: A Review
Abstract Views :215 |
PDF Views:0
Authors
R. Kanchana
1,
R. Menaka
1
Affiliations
1 School of Electronics Engineering, VIT University, Chennai – 600 127, Tamil Nadu, IN
1 School of Electronics Engineering, VIT University, Chennai – 600 127, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Computer ministered analysis is needed to diagnose nervous system diseases. Among the various human brain disorders ischemic stroke dominates and acts as the leading cause of death and frailty in most countries. A stroke occurs because of destruction of brain function due to the uproar in the blood stream to the brain. Computed Tomography (CT) and Magnetic Resonance Imaging (MRI) are the tests that processes and accounts the brains activity and plays very important role in detection and investigation of stroke. Various automated methods support well in discussing the normal and abnormal regions of brain. By visual inception it is hard to locate the critical changes in MRI and CT, thus inaugural up an immense research area for biomedical engineers to progress and contrivance numerous smart procedures for the identification of such subtle deviations. Hence computer aided detection scheme has to be developed to identify the normal and abnormal activity of the brain. This survey on stroke is to study such diagnostic system to outperform in bringing out the stroke lesions. Such automated methods using brain MRI and CT images to classify stroke activity tumors from non-tumor images greatly support researchers and doctors.Keywords
Computer Aided Method, CT, Lesion, MRI, Stroke- Survey on Signatured Xml Encryption for Multi-Tier Web Services Security
Abstract Views :161 |
PDF Views:0
Authors
Affiliations
1 Anna University, Sarder Patel Road, Old Highways Building, Guindy, Chennai - 600 025, Tamil Nadu, IN
2 GEC, NH 7, Banglore Highways, Salem - 636011, Tamil Nadu, IN
3 CS Department, Kunthavai Nachiar Govt. Arts College for Women, Arulananda Nagar West Extension, Thanjavur -613007, Tamil Nadu, IN
1 Anna University, Sarder Patel Road, Old Highways Building, Guindy, Chennai - 600 025, Tamil Nadu, IN
2 GEC, NH 7, Banglore Highways, Salem - 636011, Tamil Nadu, IN
3 CS Department, Kunthavai Nachiar Govt. Arts College for Women, Arulananda Nagar West Extension, Thanjavur -613007, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 16 (2016), Pagination:Abstract
Web service is the technology tied up with SOAP, UDDI and WSDL of XML format, so web services searching based on XML keyword become essential. By systematic monitoring it has been observed that internet communication is less protected than intranet communication. The transaction exchange held through internet in web which is one among the distributed application is embodied to different vulnerability. In distributed environment, messages and data are exchanged as Extensible Markup Language (XML) format for its vast compatibility in transit. For facing the competitive environment, any business teams have to find their suitable web services among the bulk services prevails in market. In apt to this, survey has been made with different searching techniques and way to boost the security container filled with access permitted service alone. Our research work on XML based Web security is concentrated on providing the privacy, certification and integrity. We investigate the way to regulate and insist the security by applying XML Encryption and Signature for data or messages in transaction and in storage form. It also proves the performance improvement in searching data from vast resources, if so security constraint is provided. Search Engines Optimization (SEO) is enhanced with parsing the descriptive tags rather than chaos data. Traders need not have prior knowledge of web farms lifecycle and its protection.Keywords
BPEL, Multi-Tier Security, User Satisfy Profile, Web Service, XML Cryptography- Haar Transform Based Estimation of Chlorophyll and Structure of the Leaf
Abstract Views :162 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, VIT University, IN
1 Department of Electronics and Communication Engineering, VIT University, IN
Source
ICTACT Journal on Image and Video Processing, Vol 3, No 4 (2013), Pagination: 612-615Abstract
In this paper, the health of a plant is estimated using various non-destructive Image Processing Techniques. Chlorophyll content was detected based on colour Image Processing. The Haar transform is applied to get size of leaf and the parameters.Keywords
Haar Transform, Chlorophyll, Decomposition, Gaussian Filter.- High Accurate Low Complex Face Detection Based on KL Transform and YCBCR Gaussian Model
Abstract Views :182 |
PDF Views:0
Authors
Epuru Nithish Kumar
1,
Gaddam Manoj Kumar
1,
Gunda Venkatesh
1,
Tanguturi Sai Jaswanth
1,
R. Menaka
1
Affiliations
1 Department of Electronics and Communication Engineering, VIT University, IN
1 Department of Electronics and Communication Engineering, VIT University, IN