Outlier detection techniques are widely used in many applications such as credit card fraud detection, monitoring criminal activities in electronic commerce, etc. These application...
In this paper we introduce a novel circle detection algorithm based on a weighted minimum mean square error (MSE) formulation. Traditional approaches to circle detections consist ...
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
—This paper considers the problem of detecting lines in speckle imagery, such as that produced by synthetic aperture radar (SAR) or ultrasound techniques. Using the physical prin...
Richard N. Czerwinski, Douglas L. Jones, William D...
Monitoring activities using video data is an important surveillance problem. A special scenario is to learn the pattern of normal activities and detect abnormal events from a very...
Namrata Vaswani, Amit K. Roy Chowdhury, Rama Chell...