2016 (467)
2015 (448)
2014 (181)
2013 (81)
2012 (22)
2011 (22)
2010 (20)
2009 (22)
2008 (10)
Analysis and Diagnosis of Breast Cancer
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.2 no.3 2009.09 pp.1-12
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose a method to identify abnormal growth of cells in breast tissue and suggest further pathological test, if necessary. We compare normal breast tissue with malignant invasive breast tissue by a series of image processing steps. Normal ductal epithelial cells and ductal / lobular invasive carcinogenic cells also consider for comparison here in this paper. In fact, features of cancerous breast tissue (invasive) are extracted and analyses with normal breast tissue. We also suggest the breast cancer recognition technique through image processing and prevention by controlling p53 gene mutation to some greater extent.
Biometric Authentication: A Review
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.2 no.3 2009.09 pp.13-28
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Advances in the field of Information Technology also make Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the biometric authentication techniques and some future possibilities in this field. In biometrics, a human being needs to be identified based on some characteristic physiological parameters. A wide variety of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user, and not anyone else. By using biometrics it is possible to confirm or establish an individual’'s identity. The position of biometrics in the current field of Security has been depicted in this work. We have also outlined opinions about the usability of biometric authentication systems, comparison between different techniques and their advantages and disadvantages in this paper.
Nanotechnology, Big things from a Tiny World: a Review
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.2 no.3 2009.09 pp.29-38
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The purpose of this paper is to look into the present aspects of “"Nanotechnology”". This paper gives a brief description of what Nanotechnology is?? And its application in various fields viz. computing, medicine, food technology, Robotics, Solar cells etc. It also deals with the future perspectives of Nanotechnology, risks in advanced nanotechnology.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.2 no.3 2009.09 pp.39-52
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This article is devoted to analysis and estimation of opportunities of information technologies in formation of marketing decisions. The role of information technologies in marketing activity of the companies is considered. The information systems are classified and the features of each system are described. Advantages of using information technologies in marketing and some recommendation about rise efficacy of inculcation of information technologies in marketing activity of home-grown enterprises are shown. The history of distance learning which providing an opportunity to study in any level not depending on the leaving place or job, age and others are considered in this work. The situation of e-learning in the world, especially in developed countries has been analyzed. The situation in Uzbekistan of distance education and e-learning was considered. The measures of the government and institutions, educational organizations, showed the results of the first experience in the e-learning field were analyzed. Also the importance of e-learning and the main reasons to subsidize it is regarded in the article. The role of teachers, geographical eases and time saving in e-learning are described. Selling elearning in an international market and its consequences are concerned as well in the article. We also focus on employment of honey pots for e-Government security, providing implementation architecture for it and lastly discussing its advantages.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.