In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
This paper focuses on developing a haptic rendering technique for cellular manipulation using image processing techniques and physically based models. The interaction forces betwee...
We propose a 2D model-based approach for tracking human body parts during articulated motion. A human is modeled as a stick figure with thirteen landmarks, and an action is a sequ...
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
In this paper, we compare two distinct primal sketch feature extraction operators: one based on neural network feature learning and the other based on mathematical models of the f...