One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
We investigate how positive, neutral and negative feedback responses from an Intelligent Tutoring System (ITS) influences learners‟ affect and physiology. AutoTutor, an ITS with ...
Payam Aghaei Pour, M. Sazzad Hussain, Omar AlZoubi...
In this paper, we present a real-time image processing technique for the detection of steam in video images. The assumption made is that the presence of steam acts as a blurring p...
The ability of fast similarity search at large scale is of great importance to many Information Retrieval (IR) applications. A promising way to accelerate similarity search is sem...
In this paper two methods for human face recognition and the influence of location mistakes are shown. First one, Principal Components Analysis (PCA), has been one of the most appl...