Ara
Toplam kayıt 192, listelenen: 41-50
Design and analysis of classifier learning experiments in bioinformatics: survey and case studies
(IEEE Computer Soc, 2012-12)
In many bioinformatics applications, it is important to assess and compare the performances of algorithms trained from data, to be able to draw conclusions unaffected by chance and are therefore significant. Both the design ...
Force-directed approaches to sensor localization
(Assoc Computing Machinery, 2010-09)
As the number of applications of sensor networks increases, so does the interest in sensor network localization, that is, in recovering the correct position of each node in a network of sensors from partial connectivity ...
Cryptanalysis of a new substitution-diffusion based image cipher
(Elsevier Science BV, 2010-07)
This paper introduces two different types of attacks on a recently proposed cryptosystem based on chaotic standard and logistic maps. In the two attacks, only a pair of (plaintext/ciphertext) was needed to totally break ...
Cryptanalysis of Fridrich's chaotic image encryption
(World Scientific Publishing, 2010-05)
We cryptanalyze Fridrich's chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosen-ciphertext attacks. We propose an attack that reveals the secret ...
A hybrid approach to private record matching
(IEEE Computer Soc, 2012-10)
Real-world entities are not always represented by the same set of features in different data sets. Therefore, matching records of the same real-world entity distributed across these data sets is a challenging task. If the ...
Fully decentralized and collaborative multilateration primitives for uniquely localizing WSNs
(Springer International Publishing AG, 2010)
We provide primitives for uniquely localizing WSN nodes. The goal is to maximize the number of uniquely localized nodes assuming a fully decentralized model of computation. Each node constructs a cluster of its own and ...
Comment on "Encryption and decryption of images with chaotic map lattices" [Chaos 16, 033118 (2006)]
(American Institute of Physics Inc., 2008-09)
In this paper, we comment on the chaotic encryption algorithm proposed by A. N. Pisarchik et al. [Chaos 16, 033118 (2006)]. We demonstrate that the algorithm is not invertible. We suggest simple modifications that can ...
Factored particle filtering with dependent and constrained partition dynamics for tracking deformable objects
(Springer, 2014-10)
In particle filtering, dimensionality of the state space can be reduced by tracking control (or feature) points as independent objects, which are traditionally named as partitions. Two critical decisions have to be made ...
Microsoft Kinect Sensörü kullanarak zemin düzlemi algılama
(IEEE, 2013-06-13)
Görüntü işleme tabanlı mobil robotların başarılı navigasyonu için zemin düzlemi algılama esastır. Bu bildiride Kinect derinlik sensöründen elde edilen derinlik bilgisine dayalı yeni ve gürbüz bir zemin düzlemi algılama ...
Texture recognition for frog identification
(ACM SIGMM, 2012-11-02)
This paper describes a visual processing technique for automatic frog (Xenopus Laevis sp.) localization and identification. The problem of frog identification is to process and classify an unknown frog image to determine ...