Sciweavers

251 search results - page 43 / 51
» Using Rough Set and Support Vector Machine for Network Intru...
Sort
View
KES
2005
Springer
14 years 2 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
ICMCS
2006
IEEE
131views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Self-Supervised Learning for Robust Video Indexing
The performance of video analysis and indexing algorithms strongly depends on the type, content and recording characteristics of the analyzed video. Current video indexing approac...
Ralph Ewerth, Bernd Freisleben
TIFS
2010
128views more  TIFS 2010»
13 years 7 months ago
Steganalysis by subtractive pixel adjacency matrix
This paper presents a novel method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which...
Tomás Pevný, Patrick Bas, Jessica J....
BMCBI
2008
142views more  BMCBI 2008»
13 years 9 months ago
Identification of biomarkers for genotyping Aspergilli using non-linear methods for clustering and classification
Background: In the present investigation, we have used an exhaustive metabolite profiling approach to search for biomarkers in recombinant Aspergillus nidulans (mutants that produ...
Irene Kouskoumvekaki, Zhiyong Yang, Svava Ó...
ICPR
2010
IEEE
13 years 9 months ago
Spatiotemporal-Boosted DCT Features for Head and Face Gesture Analysis
Automatic analysis of head gestures and facial expressions is a challenging research area and it has significant applications in humancomputer interfaces. In this study, facial la...
Hatice Çinar Akakin, Bülent Sankur