2008 International Conference on Computing, Communication and Networking
Wireless sensor networks have been identified as being useful in a variety of domains to include ... more Wireless sensor networks have been identified as being useful in a variety of domains to include military sensing and tracking, environment monitoring, patient monitoring and tracking smart environment, etc. When sensor networks are deployed in a hostile environment, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the resource, limitations of sensor nodes, existing network security mechanisms, including those developed for Mobile Ad-Hoc Networks, are inadequate for wireless sensor networks. In this paper, we give some security mechanisms to adapt to wireless sensor networks for sensor data and network control protocols.
Tortuosity assessments are used to estimate the tortuosity of retinal vessels as well as the reti... more Tortuosity assessments are used to estimate the tortuosity of retinal vessels as well as the retinal vessel system. In literature numerous strategies for retinal vessel tortuosity focused on curvature have been proposed. In our paper we have proposed a proficient methodology for retinal vessel tortuosity curve estimation utilizing eigen values of Hessian matrix combined with binarisation with threshold entropy and Hough transform.
Advances in retinal imaging modalities have got enabled to spot new options in retinal vessel tor... more Advances in retinal imaging modalities have got enabled to spot new options in retinal vessel tortuosity. One amongst the explanations is that this disease is often treated if known within the early stages. Several algorithms and techniques with tortuosity measures are projected. With this intention we have a tendency to propose an approach that could be fast randomized circle detection for tortuosity of retinal images using Hough transform.
Wireless sensor networks have been identified as being useful in a variety of domains to include ... more Wireless sensor networks have been identified as being useful in a variety of domains to include military sensing and tracking, environment monitoring, patient monitoring and tracking smart environment, etc. When sensor networks are deployed in a hostile environment, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the resource, limitations of sensor nodes, existing network security mechanisms, including those developed for Mobile Ad-Hoc Networks, are inadequate for wireless sensor networks. In this paper, we give some security mechanisms to adapt to wireless sensor networks for sensor data and network control protocols.
2008 International Conference on Computing, Communication and Networking
Wireless sensor networks have been identified as being useful in a variety of domains to include ... more Wireless sensor networks have been identified as being useful in a variety of domains to include military sensing and tracking, environment monitoring, patient monitoring and tracking smart environment, etc. When sensor networks are deployed in a hostile environment, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the resource, limitations of sensor nodes, existing network security mechanisms, including those developed for Mobile Ad-Hoc Networks, are inadequate for wireless sensor networks. In this paper, we give some security mechanisms to adapt to wireless sensor networks for sensor data and network control protocols.
Tortuosity assessments are used to estimate the tortuosity of retinal vessels as well as the reti... more Tortuosity assessments are used to estimate the tortuosity of retinal vessels as well as the retinal vessel system. In literature numerous strategies for retinal vessel tortuosity focused on curvature have been proposed. In our paper we have proposed a proficient methodology for retinal vessel tortuosity curve estimation utilizing eigen values of Hessian matrix combined with binarisation with threshold entropy and Hough transform.
Advances in retinal imaging modalities have got enabled to spot new options in retinal vessel tor... more Advances in retinal imaging modalities have got enabled to spot new options in retinal vessel tortuosity. One amongst the explanations is that this disease is often treated if known within the early stages. Several algorithms and techniques with tortuosity measures are projected. With this intention we have a tendency to propose an approach that could be fast randomized circle detection for tortuosity of retinal images using Hough transform.
Wireless sensor networks have been identified as being useful in a variety of domains to include ... more Wireless sensor networks have been identified as being useful in a variety of domains to include military sensing and tracking, environment monitoring, patient monitoring and tracking smart environment, etc. When sensor networks are deployed in a hostile environment, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the resource, limitations of sensor nodes, existing network security mechanisms, including those developed for Mobile Ad-Hoc Networks, are inadequate for wireless sensor networks. In this paper, we give some security mechanisms to adapt to wireless sensor networks for sensor data and network control protocols.
Uploads