Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
The campaign against drug abuse is fought by all countries, most notably on ATS drugs. The identification process of ATS drugs depends heavily on its molecular structure. However, the process becomes more unreliable due to the... more
    • by  and +2
    •   3  
      Image ProcessingDrug analysisInvariant Moments
Support Vector Machines (SVM) is used for classification in pattern recognition widely. This paper applies this technique for recognizing handwritten numerals of Devanagari Script. Since benchmark database does not exist globally, this... more
    • by 
    •   6  
      Image ProcessingMachine LearningSupport vector machineHandwritten Character Recognition, Support Vector Machine
SQL injection attacks are easy way to attack the web applications and gain access to the private data in a database. Using different types of the SQL attacks one can easily gain access, modify the database or can even remove it. Details... more
    • by 
    •   18  
      Face RecognitionSynchronizationCryptanalysisSql Injection
El presente trabajo propone un método para caracterizar y reconocer objetos 3D, basado en la identificación de patrones obtenidos a partir del análisis de la deformación de una línea de luz láser proyectada sobre un objeto en rotación,... more
    • by 
    •   6  
      Artificial IntelligenceComputer VisionPattern RecognitionImage Features Extraction
Face recognition is one of the most challenging problems in the domain of image processing and machine vision. Face recognition system is critical when individuals have very similar biometric signature such as identical twins. In this... more
    • by 
    •   4  
      Face RecognitionIdentical TwinsInvariant MomentsPseudo-zernike Moments
The three dimensional shape information of teeth from cone beam computed tomography images provides important assistance for dentist performing implant treatment, orthodontic surgery. This paper describes the tooth root of both anterior... more
    • by 
    •   18  
      Wireless CommunicationsInvestigating the Petty Levels of Innovation that Famous Corporations Settle ForSynchronizationCryptanalysis
    • by 
    •   6  
      Face RecognitionFeature ExtractionIdentical TwinsInvariant Moments
    • by 
    •   4  
      Pattern RecognitionOCRSuret/Surayt (Modern Assyrian Language)Invariant Moments
The proposed scheme uses the invariant features extracted from each block to detect the copy-move forgery regions in a digital image. In the proposed scheme, an image is first divided into overlapping blocks. Then, seven invariant moments... more
    • by 
    •   5  
      VarianceClusteringMeanInvariant Moments