In this paper we present a new architecture for face recognition with a single reference image, which completely separates the training process from the recognition process. In th...
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the ystem. The behaviour of human DCs is abstracted to form an algorithm suitable...
In this paper, we present an application of stable marriages algorithms, applied to level-line junctions, for obstacle detection. The method is implemented on our PiCar stereovisi...
Nikom Suvonvorn, Francois Le Coat, Bertrand Zavido...
— Mobile robots have to detect and handle a variety of potential hazards to navigate autonomously. We present a real-time stereo vision based mapping algorithm for identifying an...