The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Gene — Gene Interaction is a logical interaction between two genes that affects the observable behavior of one organism. This genetic interaction helps to identify pathways of associated genes for various diseases. In this paper we have used two metrics, like correlation & entropy to find the level of interaction between the genes applied on Gene Interaction networks. We have applied our algorithm...
Presentation of a novel decision tree based method to improve the ability of hand written character recognition using mathematical morphology. For this paper, classification of hand written digits is done into two groups: one with blob and another without blob. This paper proposes the recognition of digits using certain features that can distinguish one digit from the other.
In this paper, a procedure for segmentation-based image compression is suggested. Two types of segmentation techniques are used, namely threshold and region growing algorithms, and JPEG is applied to obtain the final compressed result, which provides better ratios compared to standalone compression algorithms.
The security and strength of any cryptosystem's encryption depend on the difficulty, both in terms of time and technique, of cracking the message. This paper suggests a bit cipher, a symmetric key cryptographic algorithm which provides bit-level security with linear time complexity and robust security (two 16 bit keys), and uses optimal time compared to other such ciphers by implementing concurrency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.