— In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is uniq...
The target of machine learning is a predictive model that performs well on unseen data. Often, such a model has multiple intended uses, related to different points in the tradeoff ...
Alan P. Reynolds, David W. Corne, Michael J. Chant...
Abstract—Having a risky sexual behavior increases the likelihood of infection by the Human Immunodeficiency Virus (HIV), which causes the Acquired Immunodeficiency Syndrome (AI...
Azadeh Alimadad, Vahid Dabbaghian, Suraj K. Singhk...
In this paper, we take a predefined geometry shape as a constraint for accurate shape alignment. A shape model is divided in two parts: fixed shape and active shape. The fixed shap...
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...