: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
This paper proposes a novel feature selection method based on twostage analysis of Fisher Ratio and Mutual Information for robust Brain Computer Interface. This method decomposes ...
Abstract— Most image processing applications are characterized by computation-intensive operations, and high memory and performance requirements. Parallelized implementation on s...
One of the key problems in computer vision and pattern recognition is tracking. Multiple objects, occlusion, and tracking moving objects using a moving camera are some of the chal...
Skin detection is an important preliminary process in human motion analysis. It is commonly performed in three steps: transforming the pixel color to a non-RGB colorspace, droppin...
Sriram Jayaram, Stephen Schmugge, Min C. Shin, Leo...