Sciweavers

IJNSEC
2010
112views more  IJNSEC 2010»
12 years 11 months ago
Detecting Connection-Chains: A Data Mining Approach
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
Ahmad Almulhem, Issa Traoré
GW
2007
Springer
135views Biometrics» more  GW 2007»
13 years 10 months ago
Person-Independent 3D Sign Language Recognition
In this paper, we present a person independent 3D system for judging the correctness of a sign. The system is camera-based, using computer vision techniques to track the hand and e...
Jeroen Lichtenauer, Gineke A. ten Holt, Marcel J. ...
ICIP
2004
IEEE
14 years 6 months ago
Identification of insect damaged wheat kernels using transmittance images
We used transmittance images and different learning algorithms to classify insect damaged and un-damaged wheat kernels. Using the histogram of the pixels of the wheat images as th...
A. Enis Çetin, Tom Pearson, Zehra Cataltepe