George Hamer
According to our database1,
George Hamer
authored at least 18 papers
between 2003 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
2004
2006
2008
2010
2012
2014
2016
0
1
2
3
4
5
1
2
1
1
1
1
1
4
4
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Development of Inter-Leaves Weed and Plant Regions Identification Algorithm using Histogram of Oriented Gradient and K-Means Clustering.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017
2016
Automated Single and Multi-Breast Tumor Segmentation Using Improved Watershed Technique in 2D MRI Images.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016
Enhanced Breast Cancer Classification with Automatic Thresholding Using SVM and Harris Corner Detection.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016
2015
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015
2014
Proceedings of the Symposium on Applied Computing, 2014
2011
Using 802.11 Signal Strength for Indoor Location Tracking.
Proceedings of the ISCA 26th International Conference on Computers and Their Applications, 2011
2009
Creating a Virtual Science Center -Virtual DUSEL (vDUSEL).
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009
2007
Application of the RS Method to Detect Steganographic Messages in Database Table.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007
2006
Chi-Squared Statistical Steganalysis of Database Tables.
Proceedings of the 15th International Conference on Software Engineering and Data Engineering (SEDE-2006), 2006
Statistic Preserving Steganography using Database Tables.
Proceedings of the 21st International Conference on Computers and Their Applications, 2006
Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithms.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006
Statistical steganography and steganalysis of database tables.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006
2005
An Api for Transparent Distributed Vertical Data Mining.
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005
Vertical Set Square Distance Based Clustering without Prior Knowledge of K.
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005
Secure Steganography using the Most Significant Bits.
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005
Creating Short Length Masks using Vertical Processing.
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005
2003
Watermarking Remotely Sensed Images (RSI) (Digital Image or Relational Data?).
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003
Extending the Beowulf Cluster to the Desktop.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003