Abstract—Feature extraction is a key issue in contentbased image retrieval (CBIR). In the past, a number of texture features have been proposed in literature, including statistic...
In this paper we propose Rank-Based Broadcast (RBB) algorithm using High Order Markov Chain (HOMC) with weight values in mobile p2p ad-hoc networks (MOPNET) for ubiquitous. RBB us...
Do-Hoon Kim, Myoung Rak Lee, Longzhe Han, Hoh Pete...
Detection of gait characteristics has found considerable interest in field of biomechanics and rehabilitation sciences. In this paper an approach for abnormal gait detection emplo...
Ahmed Mostayed, Mohammad Mynuddin Gani Mazumder, S...
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...