Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
An innovative technique for segmentation of color images is proposed. The technique implements an approach based on thresholding of the hue histogram. A new function for detecting...
Carmelo Amoroso, Antonio Chella, Vito Morreale, Pi...
A fast subspace analysis and feature extraction algorithm is proposed which is based on fast Haar transform and integral vector. In rapid object detection and conventional binary ...
Background: Identifying all protein-protein interactions in an organism is a major objective of proteomics. A related goal is to know which protein pairs are present in the same p...
Lan V. Zhang, Sharyl L. Wong, Oliver D. King, Fred...
In this paper, we propose an approach that retrieves motion of objects from the videos based on the dynamic time warping of view invariant characteristics. The motion is represent...