For the improvement of iris recognition system performance, the filtering algorithm that picks out counterfeit and noisy data is very important. In this paper, as a part of preproc...
In this paper, several effective learning algorithms using global image representations are adjusted and introduced to region-based image retrieval (RBIR). First, the query point m...
Feng Jing, Mingjing Li, Lei Zhang, HongJiang Zhang...
Principal Components Analysis (PCA) has been one of the most applied methods for face verification using only 2D information, in fact, PCA is practically the method of choice for ...
Facial expression recognition is necessary for designing any realistic human-machine interfaces. Previous published facial expression recognition systems achieve good recognition ...
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...