Skip to main content
    • by  and +1
    •   9  
      AuthenticationSpeaker VerificationComparisonOne class Classification
Copy-move forgery is applied on an image to hide a region or an object. Most of the detection techniques either use transform domain or spatial domain information to detect the forgery. This paper presents a hybrid method... more
    • by  and +1
    •   4  
      DvTPlanificacion Minera a Cielo AbiertoSvddekstraksi ciri Discrete Cosine Transform (DCT)
Speaker verification is a challenging problem in speaker recognition where the objective is to determine whether a segment of speech in fact comes from a specific individual. In supervised machine learning terms this is a challenging... more
    • by 
    •   7  
      Speaker VerificationComparisonOne class ClassificationNovelty Detection
    • by 
    •   10  
      Computational IntelligenceSpeaker VerificationComparisonOne class Classification
Evaluation of subjective answers submitted in an exam is an essential but one of the most resource consuming educational activity. This paper details experiments conducted under our project to build a software that evaluates the... more
    • by 
    •   5  
      Natural Language ProcessingWordnetNeo-GramscianismSVD
    • by 
    •   19  
      VideoClassification (Machine Learning)Clustering and Classification MethodsClassification (Computer Science)
The two mast cameras (Mastcam) onboard the Mars rover, Curiosity, are multispectral imagers with nine bands in each camera. Currently, the images are compressed losslessly using JPEG, which can achieve only two to three times compression.... more
    • by 
    •   13  
      Multispectral & Hyperspectral Images ClassificationJPEG IMAGE STEGANOGRAPHY USING DWTPerformance and Philosophy; Improvisation; Irony and SingularityPrincipal component analysis (PCA)
Anomaly detection based on one-class classification algorithms is broadly used in many applied domains like image processing (e.g. detection of whether a patient is " cancerous " or " healthy " from mammography image), network intrusion... more
    • by 
    •   6  
      Anomaly DetectionOne class ClassificationModel SelectionSvdd