Over the last several years, a new probabilistic representation for 3-d volumetric modeling has been developed. The main purpose of the model is to detect deviations from the norm...
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Screening mammography represents the technique adopted to detect breast cancer at an early stage. However the presence of artifacts and pectoral muscle can disturb the detection o...
Ali Cherif Chaabani, Atef Boujelben, Adel Mahfoudh...
Abstract We propose a method for estimating the topology of distributed cameras, which can provide useful information for multi-target tracking in a wide area, without object ident...
Detection and tracking of moving vehicles in airborne videos is a challenging problem. Many approaches have been proposed to improve motion segmentation on frameby-frame and pixel...