George Hamer
  According to our database1,
  George Hamer
  authored at least 18 papers
  between 2003 and 2017.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2017
Development of Inter-Leaves Weed and Plant Regions Identification Algorithm using Histogram of Oriented Gradient and K-Means Clustering.
    
  
    Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017
    
  
  2016
Automated Single and Multi-Breast Tumor Segmentation Using Improved Watershed Technique in 2D MRI Images.
    
  
    Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016
    
  
Enhanced Breast Cancer Classification with Automatic Thresholding Using SVM and Harris Corner Detection.
    
  
    Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016
    
  
  2015
    Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015
    
  
  2014
    Proceedings of the Symposium on Applied Computing, 2014
    
  
  2011
Using 802.11 Signal Strength for Indoor Location Tracking.
  
    Proceedings of the ISCA 26th International Conference on Computers and Their Applications, 2011
    
  
  2009
Creating a Virtual Science Center -Virtual DUSEL (vDUSEL).
  
    Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009
    
  
  2007
Application of the RS Method to Detect Steganographic Messages in Database Table.
  
    Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007
    
  
  2006
Chi-Squared Statistical Steganalysis of Database Tables.
  
    Proceedings of the 15th International Conference on Software Engineering and Data Engineering (SEDE-2006), 2006
    
  
Statistic Preserving Steganography using Database Tables.
  
    Proceedings of the 21st International Conference on Computers and Their Applications, 2006
    
  
Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithms.
  
    Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006
    
  
Statistical steganography and steganalysis of database tables.
  
    Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006
    
  
  2005
An Api for Transparent Distributed Vertical Data Mining.
  
    Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005
    
  
Vertical Set Square Distance Based Clustering without Prior Knowledge of K.
  
    Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005
    
  
Secure Steganography using the Most Significant Bits.
  
    Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005
    
  
Creating Short Length Masks using Vertical Processing.
  
    Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005
    
  
  2003
Watermarking Remotely Sensed Images (RSI) (Digital Image or Relational Data?).
  
    Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003
    
  
Extending the Beowulf Cluster to the Desktop.
  
    Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003