— Spectrum scarcity is becoming a major issue for service providers interested in either deploying new services or enhancing the capacity for existing applications. On the other ...
This paper reports our experiments on the concept detection task of TRECVID 2007. In these experiments, we have addressed two approaches which are selecting and fusing features and...
—An efficient approach toward a no-reference ringing metric intrinsically exists of two steps: first detecting regions in an image where ringing might occur, and second quantif...
In this paper, we show that in a multi-camera context, we can effectively handle occlusions in real-time at each frame independently, even when the only available data comes from ...
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...