Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Sickle Blood Cell Detection Based On Image Segmentation, Kholoud Alotaibi
Sickle Blood Cell Detection Based On Image Segmentation, Kholoud Alotaibi
Electronic Theses and Dissertations
Red blood cells have a vital role in human health. Red blood cells have a circular shape and a concave surface and exchange the gasses between the inside and outside of the body. However, at times, these normally round cells become sickle shaped, which is an indication of sickle cell disease. This paper introduces a unique approach to detect sickle blood cells in blood samples using image segmentation and shape detection. This method is based on calculating the max axis and min axis of the cell. The form factor is computed using these properties to determine whether the cell is …
Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo
Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo
Electronic Theses and Dissertations
Breast cancer classification can be divided into two categories. The first category is a benign tumor, and the other is a malignant tumor. The main purpose of breast cancer classification is to classify abnormalities into benign or malignant classes and thus help physicians with further analysis by minimizing potential errors that can be made by fatigued or inexperienced physicians. This paper proposes a new shape metric based on the area ratio of a circle to classify mammographic images into benign and malignant class. Support Vector Machine is used as a machine learning tool for training and classification purposes. The improved …
Game Theoretical Approach For Joint Relay Selection And Resource Allocation In Mobile Device Networks, Runan Yao
Electronic Theses and Dissertations
With the improvement of hardware, more and more multimedia applications are allowed to run in the mobile device. However, due to the limited radio bandwidth, wireless network performance becomes a critical issue. Common mobile solutions are based on the centralized structure, which require an access point to handle all the communication requirement in the work area. The transmission performance of centralized framework relies on the density of access points. But increasing the number of access points will cost lot of money and the interference between access point will reduce the transmission quality. Thanks to the wireless sensor network implementations, the …
Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan
Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan
Electronic Theses and Dissertations
The dependency on cloud computing is increasing day by day. With the boom of data centers, the cost is also increasing, which forces industries to come up with techniques and methodologies to reduce the data center energy use. Load forecasting plays a vital role in both efficient scheduling and operating a data center as a virtual power plant. In this thesis work a stochastic method, based on dependent mixtures is developed to model the data center load and is used for day-ahead forecast. The method is validated using three data sets from National Renewable Energy Laboratory (NREL) and one other …
Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni
Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni
Electronic Theses and Dissertations
This thesis explores the usage of simple printed tags for authenticating products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. An algorithm that utilizes hash chains to secure such simple tags while still keeping cost low is discussed. The security characteristics of this scheme as well as other product authentication schemes that use RFID …