In this paper, several effective learning algorithms using global image representations are adjusted and introduced to region-based image retrieval (RBIR). First, the query point m...
Feng Jing, Mingjing Li, Lei Zhang, HongJiang Zhang...
Principal Components Analysis (PCA) has been one of the most applied methods for face verification using only 2D information, in fact, PCA is practically the method of choice for ...
Facial expression recognition is necessary for designing any realistic human-machine interfaces. Previous published facial expression recognition systems achieve good recognition ...
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
We investigate how positive, neutral and negative feedback responses from an Intelligent Tutoring System (ITS) influences learners‟ affect and physiology. AutoTutor, an ITS with ...
Payam Aghaei Pour, M. Sazzad Hussain, Omar AlZoubi...