Abstract. In database marketing, the behavior of customers is analyzed by studying the transactions they have performed. In order to get a global picture of the behavior of a custo...
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Manipulation of Male sexual dysfunction (or Impotence) that concerns 10% of the male population requires expertise and great experience. Different diagnostic approaches according t...
Grigorios N. Beligiannis, Ioannis Hatzilygeroudis,...
The performance of face recognition systems that use two-dimensional images depends on factors such as lighting and subject's pose. We are developing a face recognition system...
— Real-time face recognition by computer systems is required in many commercial and security applications because it is the only way to protect privacy and security in the sea of...