In this paper requirements and conditions for the visitor identification system are outlined and an example system is proposed. Two main subsystems: face detection and face recogn...
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different tec...
— We present a fast integrated approach for online segmentation of images for outdoor robots. A compact color and texture descriptor has been developed to describe local color an...
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
We present a new method for detecting rapid eye movements called a saccade without constraining the head, based on the fast, robust pupil detection technique [1][2]. The technique...