In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
In many real-world applications such as face recognition and mobile robotics, we need to use an adaptive version of feature extraction techniques. In this paper, we introduce an a...
Corrosion causes many failures in chemical process installations. These failures generate high costs, therefore an effective corrosion monitoring system obtrudes. This paper focuse...
This paper introduces a novel method for minimum number of gene (feature) selection for a classification problem based on gene expression data with an objective function to maximi...
This paper investigates the combination of discriminative adaptation techniques. The discriminative Maximum A-Posteriori (DMAP) adaptation and discriminative feature Maximum Likel...