Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
What modes and domains of knowledge about data production processes are most critical for producing high-quality data? This study provides an answer to this question. Data are coll...
ABSTRACT. We consider a general family of regularized Navier-Stokes and Magnetohydrodynamics (MHD) models on n-dimensional smooth compact Riemannian manifolds with or without bound...
Michael Holst, Evelyn Lunasin, Gantumur Tsogtgerel
We address the issue of regularizing Osher and Rudin's shock filter, used for image deblurring, in order to allow processes that are more robust against noise. Previous soluti...
In this paper we present a framework for digital image forensics. Based on the assumptions that some processing operations must be done on the image before it is doctored, and an ...
Ismail Avcibas, Sevinc Bayram, Nasir D. Memon, Mah...