George Hamer

According to our database1, George Hamer authored at least 18 papers between 2003 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Development of Inter-Leaves Weed and Plant Regions Identification Algorithm using Histogram of Oriented Gradient and K-Means Clustering.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

2016
Automated Single and Multi-Breast Tumor Segmentation Using Improved Watershed Technique in 2D MRI Images.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016

Enhanced Breast Cancer Classification with Automatic Thresholding Using SVM and Harris Corner Detection.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016

2015
Hybrid model for object orientation classification.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

2014
Large scale processing of landsat data on various software platforms.
Proceedings of the Symposium on Applied Computing, 2014

2011
Using 802.11 Signal Strength for Indoor Location Tracking.
Proceedings of the ISCA 26th International Conference on Computers and Their Applications, 2011

2009
Creating a Virtual Science Center -Virtual DUSEL (vDUSEL).
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009

2007
Application of the RS Method to Detect Steganographic Messages in Database Table.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007

2006
Chi-Squared Statistical Steganalysis of Database Tables.
Proceedings of the 15th International Conference on Software Engineering and Data Engineering (SEDE-2006), 2006

Statistic Preserving Steganography using Database Tables.
Proceedings of the 21st International Conference on Computers and Their Applications, 2006

Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithms.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

Statistical steganography and steganalysis of database tables.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

2005
An Api for Transparent Distributed Vertical Data Mining.
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005

Vertical Set Square Distance Based Clustering without Prior Knowledge of K.
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005

Secure Steganography using the Most Significant Bits.
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005

Creating Short Length Masks using Vertical Processing.
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005

2003
Watermarking Remotely Sensed Images (RSI) (Digital Image or Relational Data?).
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

Extending the Beowulf Cluster to the Desktop.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003


  Loading...