The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...
Abstract. Face perception and text reading are two of the most developed visual perceptual skills in humans. Understanding which features in the respective visual patterns make the...
Dingyun Zhu, B. Sumudu U. Mendis, Tom Gedeon, Aksh...
Voluminous medical images are generated daily. They are critical assets for medical diagnosis, research, and teaching. To facilitate automatic indexing and retrieval of large medic...
Computational diagnosis of cancer is a classification problem, and it has two special requirements on a learning algorithm: perfect accuracy and small number of features used in t...
Our goal is to automatically identify which species of bird is present in an audio recording using supervised learning. Devising effective algorithms for bird species classificati...