Computer aided solution for automatic segmenting and measurements of blood leucocytes using static microscope images
E Abdulhay, MA Mohammed, DA Ibrahim… - Journal of medical …, 2018 - Springer
Blood leucocytes segmentation in medical images is viewed as difficult process due to the
variability of blood cells concerning their shape and size and the difficulty towards …
variability of blood cells concerning their shape and size and the difficulty towards …
A comprehensive survey on effective spectrum sensing in 5G wireless networks through cognitive radio networks
Spectrum sensing is a challenging issue in cognitive radio network. In particular, wideband
spectrum sensing gains more attention due to emerging 5G wireless networks characterized …
spectrum sensing gains more attention due to emerging 5G wireless networks characterized …
New research methods & algorithms in social network analysis
The exponential growth of social media and online social networks (eg, Facebook, Twitter,
Instagram, and TikTok) has changed the daily lives of millions of people. The ease to …
Instagram, and TikTok) has changed the daily lives of millions of people. The ease to …
Fetal electrocardiogram extraction and analysis using adaptive noise cancellation and wavelet transformation techniques
Birth defect-related demise is mainly due to congenital heart defects. In the earlier stage of
pregnancy, fetus problem can be identified by finding information about the fetus to avoid …
pregnancy, fetus problem can be identified by finding information about the fetus to avoid …
Differentially private high-dimensional data publication in internet of things
Internet of Things and the related computing paradigms, such as cloud computing and fog
computing, provide solutions for various applications and services with massive and high …
computing, provide solutions for various applications and services with massive and high …
Distributed privacy-preserving nested compressed sensing for multiclass data collection with identity authentication
M Wang, D **ao, J Liang, G Hu - Signal Processing, 2023 - Elsevier
With the increase of new sensing devices in Internet of things (IoT), data dimensions and
types have risen dramatically. The traditional data collection structure cannot satisfy the …
types have risen dramatically. The traditional data collection structure cannot satisfy the …
Performance evaluation of time-frequency distributions for ECG signal analysis
The non-stationary and multi-frequency nature of biomedical signal activities makes the use
of time-frequency distributions (TFDs) for analysis inevitable. Time-frequency analysis …
of time-frequency distributions (TFDs) for analysis inevitable. Time-frequency analysis …
Numerical simulation of the effect of empty hole between adjacent blast holes in the perforation process of blasting
H Li, X Zhang, D Li, L Wu, W Gao… - Journal of Intelligent & …, 2019 - content.iospress.com
In order to study the effect of empty hole between adjacent blast holes in the perforation
process of blasting, based on rock blasting theory, the authors use ANSYS/LS-DYNA to …
process of blasting, based on rock blasting theory, the authors use ANSYS/LS-DYNA to …
RETRACTED ARTICLE: Research on e-commerce integrated management information system of cross-border enterprises based on collaborative information …
Y Luan, Z Zhang - Information Systems and e-Business Management, 2020 - Springer
With the rapid development of information technology, transnational electronic commerce
will occupy a larger proportion in the field of export. However, domestic e-commerce is in the …
will occupy a larger proportion in the field of export. However, domestic e-commerce is in the …
A new intrusion detection and alarm correlation technology based on neural network
Y Liu, L Zhu - EURASIP Journal on Wireless communications and …, 2019 - Springer
With the continuous development of computer networks, the security of the network has
become increasingly prominent. A major threat to network security is the intrusion of …
become increasingly prominent. A major threat to network security is the intrusion of …