The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
In this paper we present a new speaker recognition system based on the fusion of two identification classifiers followed by a verification step. The user pronounces two passwords: ...
Mohamed Chenafa, Dan Istrate, Valeriu Vrabie, Mich...
One of the objectives of precision agriculture is to minimize the volume of herbicides that are applied to the fields through the use of site-specific weed management systems. Thi...
Alberto Tellaeche, Xavier P. Burgos-Artizzu, Gonza...
Abstract. The navigation task is a very demanding application for mobile users. The algorithms of present software solutions are based on the established methods of car navigation ...
This paper presents two classification systems for medical images based on association rule mining. The system we propose consists of: a pre-processing phase, a phase for mining th...
Alexandru Coman, Maria-Luiza Antonie, Osmar R. Za&...