![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessAn Ultrasonically Powered Implantable Microprobe for Electrolytic Ablation
Electrolytic ablation (EA) is a promising nonthermal tumor ablation technique that destroys malignant cells through induction of a locoregional pH change. EA is typically performed by inserting needle electrod...
-
Chapter and Conference Paper
A Study on Legal Knowledge Base Creation Using Artificial Intelligence and Ontology
Artificial Intelligence (AI) as an emerging technology, facilitates the map** of human intelligence with computerized mechanism. This capability of thinking like human being provides computer with boundless ...
-
Article
Estimation of FSO link availability using climatic data
Free Space Optical (FSO) communication systems are being adapted increasingly to provide high speed data transmission. The transmission performance of a free space optical link could be severely degraded due t...
-
Article
Communication performance of free space optical link using wavelength diversity in strong atmospheric turbulence
Atmospheric turbulence can be considered as one of the main problems facing FSO communication systems, which degrades the performance in terms of bit error rate. The objective of this paper is to examine the u...
-
Article
Apurba Kanta Choudhury (1938–2012)
-
Article
Database intrusion detection using sequence alignment
Information is considered to be the most valuable asset of any organization and hence, it should be securely maintained. However, rapid proliferation of the Internet and Web applications has increased the thre...
-
Article
Structural Characterization of PLD-grown Nanometer Size Ferromagnetic NiFeMo films
Thin films of 3 different thicknesses each of Ni83.2Fe3.3Mo13.5 and Nig83.1Fe6.0Mo10.9 alloys have been grown using Pulsed Laser Deposition (PLD) technique. Our motivation is to investigate the magnetic propertie...
-
Article
Indigenous design and fabrication of a 6.5 T superconducting magnet and a magnetotransport measurement set-up
A low-cost apparatus for measuring Hall effect and magnetoresistance is designed and built indigenously. This includes a 6.5 T superconducting magnet and a variable temperature sample holder assembly. A superi...
-
Chapter and Conference Paper
Evaluation of Segmentation Techniques Using Region Size and Boundary Information
Image segmentation quality evaluation is a key element when comparing segmentation algorithms. In computer vision, unsupervised segmentation algorithms, although of great interest, often suffer from lack of a ...
-
Chapter and Conference Paper
Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks
This paper introduces a framework for fraud detection in mobile communication networks based on the current as well as past behavioral pattern of subscribers. The proposed fraud detection system (FDS) consists...
-
Chapter and Conference Paper
STARBAC: Spatiotemporal Role Based Access Control
Role Based Access Control (RBAC) has emerged as an important access control paradigm in computer security. However, the access decisions that can be taken in a system implementing RBAC do not include many rele...
-
Chapter and Conference Paper
Modeling of Echocardiogram Video Based on Views and States
In this work we propose a hierarchical state-based model for representing an echocardiogram video using objects present and their dynamic behavior. The modeling is done on the basis of the different types of v...
-
Chapter and Conference Paper
Object Tracking Using Background Subtraction and Motion Estimation in MPEG Videos
We present a fast and robust method for moving object tracking directly in the compressed domain using features available in MPEG videos. DCT domain background subtraction in Y plane is used to locate candidat...
-
Chapter and Conference Paper
Weighted Intra-transactional Rule Mining for Database Intrusion Detection
Data mining is the non-trivial process of identifying novel, potentially useful and understandable patterns in data. With most of the organizations starting on-line operations, the threat of security breaches ...
-
Chapter and Conference Paper
Two-Stage Credit Card Fraud Detection Using Sequence Alignment
A phenomenal growth in the number of credit card transactions, especially for on-line purchases, has also led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems...
-
Chapter and Conference Paper
Integration of Keyword and Feature Based Search for Image Retrieval Applications
The main obstacle in realizing semantic-based image retrieval is from the web that semantic description of an image is difficult to capture in low-level features. Text based keywords can be generated from web ...
-
Chapter and Conference Paper
A Game-Theoretic Approach to Credit Card Fraud Detection
Intrusion prevention mechanisms are largely insufficient for protection of databases against Information Warfare attacks by authorized users and has drawn interest towards intrusion detection. We visualize the...
-
Chapter and Conference Paper
Segmentation Using Saturation Thresholding and Its Application in Content-Based Retrieval of Images
We analyze some of the visual properties of the HSV (Hue, Saturation and Value) color space and develop an image segmentation technique using the results of our analysis. In our method, features are extracted ...
-
Article
Semantic Based Concurrency Control of Open Nested Transactions in Active Object Oriented Database Management Systems
Active object oriented database management systems (AODBMS) are finding increasing application in different application domains and especially for cooperative and long duration activity management. In this pap...
-
Article
Magnetic phase transitions in Fe80-xNixCr20 (14 ⩽ x ⩽ 30) alloy studied by using 57Fe Mössbauer spectroscopy
This paper reports 57Fe Mössbauer spectroscopic studies of the polycrystalline samples of the substitutionally disordered, isostructural (fcc), ternary alloy system Fe80-xNixCr20 for x = 30, 26, 19 and 14 in the ...