This study presents a boundary-based corner detection method that achieves robust detection for digital objects containing wide angles and various curves using curvature. The bound...
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Recently, maximization mutual information (MMI) of image intensities has been proposed as a new matching criterion for automated multimodality image registration. However, the suc...
- In this paper, a new design method of adaptive PID controller is proposed. The method utilizes the so- called almost strict positive realness (ASPR) of the plant so that the stab...
Zenta Iwai, Ikuro Mizumoto, Lin Liu, S. L. Shah, H...
This paper presents a method to choose the threshold for dichotomization of survival outcomes in a structured fashion based on data analysis. The method is illustrated with an appl...
Marion Verduijn, Niels Peek, Frans Voorbraak, Ever...