Web recommendation systems based on web usage mining try to mine users' behavior patterns from web access logs, and recommend pages to the online user by matching the user...
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Monitoring media broadcast content has deserved a lot of attention lately from both academy and industry due to the technical challenge involved and its economic importance (e.g. i...
We describe a face mosaicing scheme that generates a composite face image during enrollment based on the evidence provided by frontal and semi-profile face images of an individual...
The extraction of “Level 2” detail — ridge terminations, ridge bifurcations, bridges etc. — from digitised images of fingerprints requires an accurate segmentation of the...