A daily activity and been implemented as a key feature in many map services like Google and Bing Maps. A fast driving route saves not only the time of a driver but also energy consumption. This service is important for both end users and governments aiming to ease traffic problems and protect environment. The time […]
Active Discovery And Imblanced Learning in Generative-Discriminative models
The vast majority of sky survey image content is due to well understood phenomena, and only 0.001% of data is of interest for astronomers to study. Computer network intrusion detection exhibits vast amounts of normal user traffic, and a very few examples of malicious attacks. In computer vision based security surveillance of public spaces, observed […]
PPDA techniques for security multiparty computation
PRIVACY and security, particularly maintaining confidentiality of data, have become a challenging issue with advances in information and communication technology. The ability to communicate and share data has many benefits, and the idea of an omniscient data source carries great value to research and building accurate data analysis models. For example, for credit card companies […]
Enhanced Adaptive ACKnowledgment to detect Secure Intrusion in for MANETs
In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in certain circumstances while does not greatly affect the network performances. The migration to wireless network from wired network has been a global trend in […]
Multimedia Search With Pseudo Revelance Feedback
Search reranking is regarded as a common way to boost retrieval precision. The problem nevertheless is not trivial especially when there are multiple features or modalities to be considered for search, which often happens in image and video retrieval. This paper proposes a new reranking algorithm , named circular reranking, that reinforces the mutual exchange of information across […]
- « Previous Page
- 1
- …
- 3
- 4
- 5