DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT
|
|
- Teresa Palmer
- 6 years ago
- Views:
Transcription
1 DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology, Sihuan Normal University, Chengdu , China 1 tanghangguo@sinu.edu.n ABSTRACT In order to monitor the use of network transmission software, the network penetrating tehnique based on enrypted proxy is disussed. By omparing the behavior of related penetration software, the onept of ommuniation fingerprint is introdued to expand the extension of the ommuniation features. The fingerprints database of enrypted proxy software with speifi harateristis is onstruted, and a heuristi identifiation system for enrypted proxy software is designed and implemented. Test results indiate that the system runs effiiently and the results are aurate. Keywords: Proxy; Enrypted Proxy; Network Penetrating; Communiation Fingerprint; Network 1. INTRODUCTION With the rapid development of Internet, It is partiularly important to ontrol Information and ontent on the Internet. However, in reent years a lass of Internet penetration software appeared. Through dynamially proxy server, it an send the enrypted information, and thereby breakthrough Internet blokade so as to avoid supervision. Network penetration tehnique generally integrated with agent tehnology, enrypted tunnel tehnology, multi-hop tehnology, anonymous ommuniation tehnology[1,2], it an not only break through the existing safety devie to aess illegal websites, but also sent attak ode, seret data to the destination host. Therefore, the researh of network penetration tehnology and the orresponding monitoring measures is of great realisti signifiane. In order to prevent the spread of harmful information, generally the firewall is arranged between in the trust and distrust network, whih is used for sensitive ontent filtering suh as websites, IP address, key words and URL. However, the weakness of these filtering tehniques is powerless to the enrypted information, and the keyword of URL or webpage an be used to enrypt by different methods, so that suh information filtering system is fundamentally out of ation [3]. In this paper, we fous on the working priniple of enrypted proxy. Through the analysis and summariation of ommuniation proess and behavior of suh software, we mastered the working mehanism and ommuniation fingerprint, on that basis, the generi detetion sheme of suh software was designed. The rest of this paper is organied as follows: Setion 2 addresses related work of network penetrating behavior and enrypted proxy tehnology. Setion 3 desribes the bakground of ommuniation fingerprint. Our detetion approah and key tehnologies rare also explained in setion 3. Experiments are explained in setion4, followed by onlusions and future work in setion RELATED WORK 2.1enrypted proxy tehnology The network penetration proess based on the enrypted proxy is shown in Figure 1. Enrypted proxy server was plaed between the inseure network environment and safe network environment, only when the enrypted ommuniation both use the same protool, the enryption server port an be onneted and aessed by lient[4,5,6]. To implement the information transmitting and plaintext-iphertext onversion between appliation program and enrypted server, the lient needs to run the enrypted proxy software, and through the use of network ryptosystem in the seure hannel it an provide ustomers with safe and reliable data. 2.2The omparison of existing enrypted proxy tehnology and tools In order to evaluate the enryption software penetrating ability, we must first understand the different network ontent filtering priniple [7]. 82
2 Table 1 gives the three main kinds of filtering methods and the orresponding penetration Firewall tehnology. diret aess, unreahable Client (Enrypted proxy software) through a proxy server to aess, reahable Enrypted proxy server through a proxy server to aess, reahable Figure 1 Shemati diagram of enrypted proxy firewall penetration target server Table 1 Existing ontent filtering tehnology and the orresponding penetration tehnology ontent filtering tehnology DNS request filtering Webpage ontent filtering IP address filtering penetration tehnology Transmitted DNS request paket through an enrypted hannel or overt hannel Transmitted Web traffi through an enrypted hannel or overt hannel Transmitted all traffi through an enrypted hannel or overt hannel Figure 2 the model s logi diagram Table 2 omparison of ommonly used tools for penetration Transmitted DNS request paket through an enrypted hannel Transmitted Web traffi through an enrypted hannel Transmitted all traffi through an enrypted hannel Ultra Surf supporte d supporte d supporte d Gaps Frigate Garden supportunsupporsupport ed ted ed supportsupporte ed d supportsupporte ed d support ed support ed 83
3 The breakthrough effet of network bloking software by different enryption methods is different. In view of the existing mainstream network enrypted proxy software, we presented the omparative test results of the network penetration method and apability, as shown in Table 2. As an be seen, not all of the tool will enrypt all of the ontent, for example, the Free Gate software does not enrypt the DNS request paket, and this approah provides the appropriate means of detetion. 3. DETECTION METHODS FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 3.1 Working mehanism and proess The detetion model works on the network gateway, aiming to detet the use behavior of enrypted proxy software through the analysis of network data flow. The working mehanism and the proess are shown in Figure 2. In order to aurately identify different types of enrypted proxy software, here we introdue the onept of ommuniation fingerprints, whih ontains five attributes, suh as port features, IP features, protool enryption features, dynami flow harateristi and the paket payload harateristis. To take into aount the effiieny and auray, the detetion mehanism should be stratified. In this paper the detetion engine is divided into three levels, among the port, IP is a wide range of blind san layer, followed by the intention detetion layer omposed by protool enryption behavior and dynami flow behavior. On the basis of the two above detetion layers, exat mathing layer uses the paket s payload harateristis for ontenting detetion. Blind san layer, intention detetion layer and aurate mathing layer investigate step by step from three levels that is the ommuniation protool, ommuniation behavior and the ommuniation ontent. Generally speaking, with the detetion level layer depth the performane ost inreases. However, this hierarhial heuristi detetion arhiteture an not only ensure a very high detetion auray, versatility and adaptability[8], but also signifiantly redues the ollet quantity and analysis, at the same time make it possible for rapid detetion and aurate reognition under the omplex bakground noise. 3.2 Part of the key tehnologies Formal desription method of ommuniation fingerprints harateristis In order to determine what kind of network harateristis an be used as network fingerprint of speifi software [9], we defined the onept of network fingerprint model and gave the general formal desription. [Definition] Network fingerprint model: network fingerprint model an be abstrated as a 5- tuple array, expressed P I P O as FP =<,, C, O, F >. Among them, P I represents a set of input data pakages, O P represents the set of output or response pakages, = {,,..., } represents network harater C n set, O o o om = {,,..., } represents the deteting objets, suh as, O = {OS type,url, Payload}. The fingerprint detetion funtion F is defined as: P P P P P = = {( x, y) x, y } is a I O I O direted ordered pair, Z = ρ( P), then F is mappings of the power set of the Cartesian produt on the P and I P, that is, F : Z C. O Aordingly, we got the neessary and suffiient onditions whether network feature an be used as a fingerprint model, suh as: Testability: For the detetion of objet O, Z, there existed C,whih make F( ) = C ; Uniqueness: For the detetion of objet O, to arbitrary Z 1 Z, Z2 Z, and,then we got F( ) F( ), and vie versa. Stability: For the detetion of objet O, to arbitrary Z1 Z, Z2 Z, and, there existed C,whih make F( ) = ;or there existed C 2 1 and 2, whih make F( ) = ourred simultaneously. ( ) =, 1 F C C 2 F( ) C, = and Separability: For any two different network ommuniation software i and j, exerted the same detetion funtion on the same objet, that is, FP =<,,,, i P I O F i P Oi C > i, =<,,,, j Ij O F >,i j,then Oj j i j FP P P C 1 84
4 In order to apture the ommuniation behaviors of enrypted proxy software, we an use a kind of reverse diretion analysis method, or blak box testing method to analysis ommuniation pakets. Figure 3 gives the operation and ommuniation mehanism of the Free Gate software when it runs on a omputer the first time. First, the Free Gate started, and then tested environment during the startup, then the speifi data were generated, through a variety of queries the Free Gate obtained proxy server information, after aessing to information of proxy server it began to establish the proess of enryption ommuniation, if it an suessfully start its ommuniation. In order to ensure that data will not interepted by third parties, the proxy server and lient devies need to ommuniate seurely, whih is divided into two parts involved by seret key establishment and seure ommuniations. Thus, it an be summed up that the network ativity of network penetrating software is divided into three stages [10, 11]: Deteting. Aess to domesti and foreign wellknown sites is used to detet whether the internet an be aess. Aess. Aess to full-time DNS server provides updates information support. Enrypting. Aess to the enrypted proxy server usually uses SSL enryption. Figure3. Communiation sequene diagram of enrypted proxy software Through the above analysis we an find that the ommuniation pakets of enrypted proxy software have the two ategories of features, whih are payload harateristi ode and dynami flow anomalies. Therefore, we used both deep paket inspetion (DPI) and dynami flow inspetion (DFI). DPI not only analyed the 5-tuple of IP header, but also added the appliation layer payload segment analysis, thus it an not only aurately reognie enryption agent ontent, but also deal with the esape behaviors suh as port-reuse, random port or even the enrypted transmission. DFI identifies enryption agent traffi via average flow rate, flow duration, number of bytes, paket length and other harateristi information. Through a large number of data paket analysis experiment, we established the flow harateristi model. By apturing the series of flow behavior and omparing with the flow model, thus the use behavior of the enrypted proxy software an be deteted. As an example, the key features of Free Gate s ommuniation stream were extrated as follows: DNS query paket length is generally 558. Aess to most of the IP does not belong to the mainland (among them, China Taiwan and the United States aount for a larger proportion). DNS requests use the same port for 2-3 rounds of queries. DNS is divided into 5 setions. Eah round of query interval may be equal; eah wheel is equal to the number of queries. HTTP and DNS use serial ports, and DNS request ports greater than The DNS name servers and proxy servers end in16.mjuyh.om, suh as: d8ef0d40b f.a 0ff830ba9a8dd e47271d55a mj uyh.om. Use SSL to enrypt the ommuniation Identifying SSL-enrypted data Almost all enrypted proxy software adopted SSL to enrypt the ontents of appliation layer, as shown in Table 3. Therefore, the use of SSL 85
5 protool an be used as an assist feature on the ommuniation behaviors of suh software. SSL protool stak was shown in Figure 4[12]. Beause the sequene enryption in Reord Protool didn t have any filling mehanism, the protool iphertext length exposed the plaintext length, so that flow analysis an be done. On the other hand, the handshake messages transmitted in plaintext before the "Finished" message in the handshake protool layer, thus it an be used for payload harateristi ode analysis [13, 14]. The method is to first filter out the session flow by 443 ports, and then examines the session payload ontents to identify whether there exists some orresponding feature strings deision trees algorithm The deteting proess of enrypted proxy software based on the network data pakage is in fat a lassifiation problem to distinguish the enrypted proxy ativities from legitimate ommuniations. As an important data mining Tehnology, lassifiation is designed aording to the harateristis of the data set to onstrut the lassifiation funtion or model, by whih the unknown samples an be mapped in a ertain to a given ategory. Strutural model was generally divided into two stages, that is, training and testing, and aordingly the model data sets were randomly divided into training set and test data sets. In the training phase, the training data set was used to onstrut the lassifiation model by analying the data desribed by the attributes. When in the testing phase, the test data set was used to evaluate the auray of the lassifiation model, if that model auray is aeptable, then it an be used to lassify for other data[15]. In this paper, the deision tree model to detet enrypted proxy software used ommuniation fingerprints as input vetor, as shown in Figure 5. Considering that the tree struture was too omplex and will produe over-fitting, to avoid this, we should onsider the partial ordering relation existing in the importane of properties used to identify enryption agent software, whih is we must take the important as prinipal omponent and the less important for lipping. In addition, in order to improve the effiieny of algorithm model, we adopted the Hash table instead of a database to store ommuniation fingerprints. The node element of Hash table indiates the ommuniation behaviors of one host, ommuniation behavior data types and Hash types are as follows: Typedef strut // Defining the node in Hash table { Int USER_ID; // Using IP-MAC as primary key Char ComFP; // attribute name of eah ommuniation fingerprint Int TreeNet; // the level of behavior tree whih the ommuniation fingerprint lying on ElemType* next }ElemType Typedef strut //defying Hash table using HashTab { ElemType* next; Int ount; // key value Int typeindex; // key value } Hash Tab Table 3 test results of ommon penetrating tool for appliation-layer enryption Ultra Free Gaps Surf Gate Garden HTTP ipherte iphertex iphert ipherte HTTPS ipherte iphertex iphert ipherte Mail ipherte iphertex iphert ipherte FTP ipherte iphertex iphert ipherte Google Talk ipherte iphertex iphert plaintex xt t ext t Windows Live ipherte iphertex iphert plaintex Messenger xt t ext t Figure 4 SSL protool stak 86
6 4. EXPERIMENT AND RESULTS ANALYSIS Figure 5 Communiation behavior trees and filtering algorithm In the detetion experiments, we build the network ommuniation environment needed by Ultra Surf browser, deployed network paket apture software on the network export, and then loaded the pakets into our filtering algorithm model. In order to simulate the real traffi environment, we used the ampus network ommuniation flow as bakground noise, by importing experimental data aptured by Campus Network Center on that day; our model suessfully loated a plurality of suspiious pakets file. One of our tests shows that our model orretly identified the Ultra Surf browser and suessfully assoiated its ommuniation behavior proess: host used Ultra Surf browser, after starting, the Ultra Surf browser opened the 2224 port, and then launhed frequent periodi onnetion to its enrypted proxy server, after a suessful onnetion it used HTTPS enryption protool to ommuniate with a network host whih IP is , the host s loation was Taiwan. 5. CONCLUSION AND FUTURE WORK In this paper, we have presented the heuristi detetion with multi-feature, introdued the onept of ommuniation fingerprint to extend the range of ommuniation features, and developed deision tree methods to distinguish the enrypted proxy ativities from normal traffi. Being expanded slightly, the method an be used for detetion and 87 reognition of the other network ommuniation software. Future work will inlude: The expansion of training sets, test sets and the experiments for various kernels whih an be use for performane improvement and some of its onstraint parameters; Aording to the different harateristis of the ommuniation software, the unified, standardied, and formalied desription of ommuniation feature will be studied; Communiation fingerprint automated extration tehnology is a key researh diretion of the next step. 6. ACKNOWLEDGMENT This work was support by the Projet of Applied Basi Researh of Sihuan Provine(No.07JY ), the Projet of Department of Eduation of Sihuan Provine(No.12ZB105). REFERENCES [1] L.Yan, H.Z. Li and Z.G.Tang, Mingquan ZHONG. Tehniques of Trojans penetrating personal firewall, Netinfo Seurity, Vol.9, No.20, 2010,pp: [2] L. Peng, Researh on Network penetration tehnique, Beijing University of Posts and Teleommuniations, [3] D.X. Qu, X.T. Tang, L.C. Xu and L.Shi, Overview of Researh on Network Information
7 Filting System, Journal of Shandong Normal University, Natural Siene, Vol.22, No.2, 2006, pp [4] Z. Zhou, X.M. Han and B. Wen, Analysis of Enrypted Proxy Servers Tehniques. Journal of Information Engineering University, Vol.7, No.4, 2006, pp: [5] D.F. Liu and P.C Tan, Effiient Approah for Searhing Data Pakage of Enrypted Proxy, Command Information System and Tehnology, Vol.1, No.4, 2010, pp: [6] C.L Wang. Researh on the penetrate tehnology of Boundary network safety protetion devie. Network & Computer Seurity, Vol.2, 2007, pp: [7] J. Smart, K. Tedeshi and D. Meakins, Peter Hannay & Christopher Bolan., Subverting National Internet Censorship-An Investigation into existing Tools and Tehniques, forensis/smart%20et%20al%20bypassing%20 Internet%20Censorship.pdf. [8] L. Martignoni, E. Stinson, M. Fredrikson, S. Jha and J.C. Mithell, A Layered Arhiteture for Deteting Maliious Behaviors, RAID 2008 pp: [9] Z.G. Tang, H.Z. Li, M.Q. Zhong, J. Zhang. Study of Remote Computer network Fingerprint model. Computer Engineering and Design, Vol.32, No.8, 2011, pp: [10] Z. Zhou, Effiient Approah for Searhing Data Pakage of Enrypted Proxy. Computer Engineering, Vol.33, No.21, 2007, pp: [11] H.T Gao, Researh on investigation and evidene olletion of network penetrating software. Polie Tehnology, Vol.11, No.6, 2010, pp: [12] L. Zhang. Researh and appliation of SSLbased VPN enrypted tunnel. Information Tehnology, Vol. 8, 2010, pp : [13] Y. Luo and Z. Huang, Priniple and Prevention of SSL Attak In Gateway Mode. Information Seurity and Communiations Privay, Vol.4, 2011, pp: [14] S.M. Yang and S.D. He, The SSL protool onnetion proess and safety performane analysis, Software Guide, Vol.10, No.3, 2011, pp: [15] N.N. Xie, Y.X Liu. Improvement of attribute seletion riterion of deision trees. Computer Engineering and Appliations, Vol.46, No.34, 2010, pp:
- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.
- 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationSVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections
SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty
More informationA {k, n}-secret Sharing Scheme for Color Images
A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationOutline: Software Design
Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling
More informationAlgorithms, Mechanisms and Procedures for the Computer-aided Project Generation System
Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department
More informationThe Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm
More informationA DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR
Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationA scheme for racquet sports video analysis with the combination of audio-visual information
A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy
More informationDisplacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks
Displaement-based Route Update Strategies for Proative Routing Protools in Mobile Ad Ho Networks Mehran Abolhasan 1 and Tadeusz Wysoki 1 1 University of Wollongong, NSW 2522, Australia E-mail: mehran@titr.uow.edu.au,
More informationEstablishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments
Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,
More informationA Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks
A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr
More informationA Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks
International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering
More informationUnsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks
Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens
More informationMulti-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality
INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationWhat are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study
What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The
More informationExtracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationHEXA: Compact Data Structures for Faster Packet Processing
Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for
More informationImproved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules
Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu
More informationDefect Detection and Classification in Ceramic Plates Using Machine Vision and Naïve Bayes Classifier for Computer Aided Manufacturing
Defet Detetion and Classifiation in Cerami Plates Using Mahine Vision and Naïve Bayes Classifier for Computer Aided Manufaturing 1 Harpreet Singh, 2 Kulwinderpal Singh, 1 Researh Student, 2 Assistant Professor,
More informationEpisode 12: TCP/IP & UbiComp
Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,
More informationMulti-Channel Wireless Networks: Capacity and Protocols
Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:
More informationCapturing Large Intra-class Variations of Biometric Data by Template Co-updating
Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University
More informationFlow Demands Oriented Node Placement in Multi-Hop Wireless Networks
Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless
More informationHigh-level synthesis under I/O Timing and Memory constraints
Highlevel synthesis under I/O Timing and Memory onstraints Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn, Eri Martin To ite this version: Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn,
More informationAustralian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message
ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering
More informationCross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer
Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based
More informationA Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks
A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,
More informationthe data. Structured Principal Component Analysis (SPCA)
Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving
More informationA Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks
International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali
More informationSystem-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications
System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More informationCA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5
Proven Professional Exam (CAT-480) Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer
More informationBatch Auditing for Multiclient Data in Multicloud Storage
Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and
More informationContents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8
Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4
More informationCOSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems
COSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems Andreas Brokalakis Synelixis Solutions Ltd, Greee brokalakis@synelixis.om Nikolaos Tampouratzis Teleommuniation
More informationRAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,
More informationUplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks
62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering
More informationDetection and Recognition of Non-Occluded Objects using Signature Map
6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,
More informationA Formal Hybrid Analysis Technique for Composite Web Services Verification
A Formal Hybrid Analysis Tehnique for Composite Web Servies Verifiation MAY HAIDAR 1,2, HICHAM H. HALLAL 1 1 Computer Siene Department / Department of Eletrial Engineering Fahad Bin Sultan University P.O
More informationApproximate logic synthesis for error tolerant applications
Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu
More informationPerformance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application
World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah
More informationFine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations
Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations ABSTRACT Maitreya Natu University of Delaware 103 Smith Hall Newark, DE 19716, USA natu@is.udel.edu Reently proposed apability
More informationMulti-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks
Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,
More informationA New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification
A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia
More informationExploiting Enriched Contextual Information for Mobile App Classification
Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center
More informationNew Fuzzy Object Segmentation Algorithm for Video Sequences *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department
More information13.1 Numerical Evaluation of Integrals Over One Dimension
13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied
More informationTUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM
TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM M. Murugeswari 1, M.Gayathri 2 1 Assoiate Professor, 2 PG Sholar 1,2 K.L.N College of Information
More informationA Hybrid Neuro-Genetic Approach to Short-Term Traffic Volume Prediction
A Hybrid Neuro-Geneti Approah to Short-Term Traffi Volume Predition 1. Introdution Shahriar Afandizadeh 1,*, Jalil Kianfar 2 Reeived: January 2003, Revised: July 2008, Aepted: January 2009 Abstrat: This
More informationWe don t need no generation - a practical approach to sliding window RLNC
We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,
More informationThe AMDREL Project in Retrospective
The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis
More informationtimestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else
3rd International Conferene on Multimedia Tehnolog(ICMT 013) An Effiient Moving Target Traking Strateg Based on OpenCV and CAMShift Theor Dongu Li 1 Abstrat Image movement involved bakground movement and
More informationAbstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.
Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,
More informationCA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0
Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer
More information1. Introduction. 2. The Probable Stope Algorithm
1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground
More informationAcoustic Links. Maximizing Channel Utilization for Underwater
Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it
More informationRobust Dynamic Provable Data Possession
Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)
More informationFOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW
FOREGROUND OBJECT EXTRACTION USING FUZZY C EANS WITH BIT-PLANE SLICING AND OPTICAL FLOW SIVAGAI., REVATHI.T, JEGANATHAN.L 3 APSG, SCSE, VIT University, Chennai, India JRF, DST, Dehi, India. 3 Professor,
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement
More informationPerformance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification
erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,
More informationExploring the Commonality in Feature Modeling Notations
Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om
More informationCOST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY
COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary
More informationDetecting Outliers in High-Dimensional Datasets with Mixed Attributes
Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of
More informationA Lightweight Intrusion-Tolerant Overlay Network
A Lightweight Intrusion-Tolerant Overlay Network Rafael R. Obelheiro and Joni da Silva Fraga Department of Automation and Systems Federal University of Santa Catarina, Brazil Email: rro@das.ufs.br, fraga@das.ufs.br
More informationMultiple-Criteria Decision Analysis: A Novel Rank Aggregation Method
3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr
More informationGraph-Based vs Depth-Based Data Representation for Multiview Images
Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:
More informationAdobe Certified Associate
Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals
More informationAnalysis of input and output configurations for use in four-valued CCD programmable logic arrays
nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,
More informationAn Efficient and Scalable Approach to CNN Queries in a Road Network
An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,
More informationSINR-based Network Selection for Optimization in Heterogeneous Wireless Networks (HWNs)
48 J. ICT Res. Appl., Vol. 9, No., 5, 48-6 SINR-based Network Seletion for Optimization in Heterogeneous Wireless Networks (HWNs) Abubakar M. Miyim, Mahamod Ismail & Rosdiadee Nordin Department of Eletrial,
More informationImproved Circuit-to-CNF Transformation for SAT-based ATPG
Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany
More informationGradient based progressive probabilistic Hough transform
Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti
More informationDoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay
DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at
More informationUser-level Fairness Delivered: Network Resource Allocation for Adaptive Video Streaming
User-level Fairness Delivered: Network Resoure Alloation for Adaptive Video Streaming Mu Mu, Steven Simpson, Arsham Farshad, Qiang Ni, Niholas Rae Shool of Computing and Communiations, Lanaster University
More informationAccommodations of QoS DiffServ Over IP and MPLS Networks
Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering
More informationAutomatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)
Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University
More informationTime delay estimation of reverberant meeting speech: on the use of multichannel linear prediction
University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel
More informationChapter 2: Introduction to Maple V
Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard
More informationParallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup
Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok
More informationThe Implementation of RRTs for a Remote-Controlled Mobile Robot
ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh
More informationCA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1
Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationFast Elliptic Curve Algorithm of Embedded Mobile Equipment
Send Orders for Reprints to reprints@benthamsiene.net 8 The Open Eletrial & Eletroni Engineering Journal, 0, 7, 8-4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment Open Aess Lihong Zhang *, Shuqian
More informationCA Service Desk Manager 14.x Implementation Proven Professional Exam (CAT-181) Study Guide Version 1.3
Exam (CAT-181) Study Guide Version 1.3 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationTrajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller
Trajetory Traking Control for A Wheeled Mobile Robot Using Fuzzy Logi Controller K N FARESS 1 M T EL HAGRY 1 A A EL KOSY 2 1 Eletronis researh institute, Cairo, Egypt 2 Faulty of Engineering, Cairo University,
More informationPerformance Benchmarks for an Interactive Video-on-Demand System
Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department
More informationCluster-Based Cumulative Ensembles
Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,
More informationCOMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP
Combination of intersetion- and swept-based methods for single-material remap 11th World Congress on Computational Mehanis WCCM XI) 5th European Conferene on Computational Mehanis ECCM V) 6th European
More informationUsing Augmented Measurements to Improve the Convergence of ICP
Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,
More informationA Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering
A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,
More informationDrawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;
Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;
More informationBoosted Random Forest
Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,
More informationarxiv: v1 [cs.db] 13 Sep 2017
An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution
More informationDeep Rule-Based Classifier with Human-level Performance and Characteristics
Deep Rule-Based Classifier with Human-level Performane and Charateristis Plamen P. Angelov 1,2 and Xiaowei Gu 1* 1 Shool of Computing and Communiations, Lanaster University, Lanaster, LA1 4WA, UK 2 Tehnial
More informationKERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION
KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese
More informationMachine Vision. Laboratory Exercise Name: Student ID: S
Mahine Vision 521466S Laoratory Eerise 2011 Name: Student D: General nformation To pass these laoratory works, you should answer all questions (Q.y) with an understandale handwriting either in English
More information