SEGMENTATION OF DIABETIC RETINOPATHY RETINAL EYE IMAGE USING ANT COLONY OPTIMIZATION ALGORITHM
Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER AND INFORMATION TECHNOLOGY
Author(s): SELVARAJAN S , VIJAYALAKSHMI
Abstract: Ant colony optimization is a technique for optimization that was introduced in the early 1990’s. The inspiring source of ant colony optimization is the foraging behavior of real ant colonies. This behavior is exploited in artificial ant colonies for the search of approximate solutions to discrete optimization problems, to continuous optimization problems, and to important problems in telecommunications, such as routing and load balancing. Diabetic is one the important cost related problems. And also it gives the numerous eye problems for humans like Diabetic retinopathy. In this work a new method have been proposed to segment the eye affected by diabetic retinopathy. Segmentation is one of the important modules of any image processing technique. In this work we have proposed the Ant Colony Optimization (ACO) algorithm to segment the Human eye. The performance of the proposed system has been verified and validated with another standard algorithm. This technique is a Novel technique to s
- Publication Date: 05-May-2013
- DOI: 10.15224/978-981-07-6261-2-04
- Views: 0
- Downloads: 0
A TRAFFIC SIGNATURE SENSITIVE TO CLIENT MACHINES
Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER AND INFORMATION TECHNOLOGY
Author(s): KAZUMASA OIDA
Abstract: A robust authentication strategy requires a user to provide not only a password but also something the user has. Generally, “what you have” authentication methods require additional hardware to strengthen security. However, such devices are not widely used today. This paper proposes another “what you have” authentication approach, in which a user machine is identified by analyzing video traffic flowing from an authentication server to the user machine. This scheme is inexpensive and resistant to machine and credential theft. Experimental results demonstrate that the traffic signature used in this paper is responsive to a small difference between two user machines.
- Publication Date: 05-May-2013
- DOI: 10.15224/978-981-07-6261-2-05
- Views: 0
- Downloads: 0