Sciweavers

328 search results - page 29 / 66
» Detection, Analysis and Matching of Hair
Sort
View
TCOM
2008
106views more  TCOM 2008»
14 years 11 months ago
Performance analysis on LDPC-Coded systems over quasi-static (MIMO) fading channels
In this paper, we derive closed form upper bounds on the error probability of low-density parity-check (LDPC) coded modulation schemes operating on quasi-static fading channels. Th...
Jingqiao Zhang, Heung-No Lee
ICDAR
2011
IEEE
13 years 11 months ago
Text-Line Extraction Using a Convolution of Isotropic Gaussian Filter with a Set of Line Filters
—Text-line extraction is a key task in document analysis. Methods based on anisotropic Gaussian filtering and ridge detection have shown good results. This paper describes perfo...
Syed Saqib Bukhari, Faisal Shafait, Thomas M. Breu...
ICDAR
2003
IEEE
15 years 5 months ago
A Fast Multifunctional Approach for Document Image Analysis
Collinear arrangement of objects (such as, text elements or continuous lines) is integral part of any office document image, whether structured or unstructured. The ability to ana...
Abhishek Gattani, Maitrayee Mukerji, Hareish Gu
ICONIP
2008
15 years 1 months ago
Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly
In this paper, we try to develop a machine learning-based virus email detection method. The key feature of this paper is employing Mail Header and Encoding Anomaly(MHEA) [1]. MHEA ...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
IJNSEC
2008
117views more  IJNSEC 2008»
14 years 11 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin