We propose a scheme to introduce directionality in the Random Walker algorithm for image segmentation. In particular, we extend the optimization framework of this algorithm to com...
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Abstract—This paper presents the development and performance evaluation of a human-computer interface that enables a limb-disabled person to access a computer via neural signals....
Changmok Choi, Hyonyoung Han, Chunwoo Kim, Jung Ki...
—Event-related potentials (ERPs) recorded at the scalp are indicators of brain activity associated with eventrelated information processing; hence they may be suitable for the as...
Akaysha C. Tang, Matthew T. Sutherland, Christophe...