Sciweavers

IJNSEC
2010
112views more  IJNSEC 2010»
14 years 3 months ago
Detecting Connection-Chains: A Data Mining Approach
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
Ahmad Almulhem, Issa Traoré
85
Voted
GW
2007
Springer
135views Biometrics» more  GW 2007»
15 years 3 months ago
Person-Independent 3D Sign Language Recognition
In this paper, we present a person independent 3D system for judging the correctness of a sign. The system is camera-based, using computer vision techniques to track the hand and e...
Jeroen Lichtenauer, Gineke A. ten Holt, Marcel J. ...
65
Voted
ICIP
2004
IEEE
15 years 10 months ago
Identification of insect damaged wheat kernels using transmittance images
We used transmittance images and different learning algorithms to classify insect damaged and un-damaged wheat kernels. Using the histogram of the pixels of the wheat images as th...
A. Enis Çetin, Tom Pearson, Zehra Cataltepe