The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Image segmentation is the focus in the image processing technology all the time. Medical image segmentation is an important application in the field of image segmentation. Wavelet transform is proposed to segment medical image. Firstly the gray level histogram of the medical image was processed using multiscale wavelet transform. Then the gray threshold was gradually emerged by the performance...
The paper studied the outage performance for MIMO Multi-Relay ISDF (MR-ISDF) (Incremental and Selective Decode-and-Forward) cooperative communication systems. Firstly, the end-to-end mutual information, outage and OPA (optimal power allocation) for MR-ISDF was derived under the technology of MRC and beam-forming. Then the optimal single ISDF (OS-ISDF) which acted as routing protocol was introduced...
Firstly, how to send the real-time data collected by each computer to all the computers in network for their monitoring, secondly, how to send the historical data to each computer in the whole network to ensure a consistent whole network data, In addition, how to send the command to an implementing computer, and control records of the whole network of other computers. Combining many aspects, this...
Key exchange protocol is an efficient approach for providing a secure communication channel between two entities who want to communicate with each other over an insecure network by a shared session key. Over the past ten years, many identity-based protocols from the pairs have been proposed since the identity-based protocol pubic key can be an arbitrary string such as name, address, or email address,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.