Sciweavers

IAJIT
2016
52views Biometrics» more  IAJIT 2016»
8 years 8 months ago
WPFP-PCA: weighted parallel fixed point PCA Face recognition
: Principal Component Analysis (PCA) is one of the feature extraction techniques, commonly used in human facial recognition systems. PCA yields high accuracy rates when requiring l...
Chakchai So-In, Kanokmon Rujirakul
IAJIT
2016
60views Biometrics» more  IAJIT 2016»
8 years 8 months ago
A DEA-based approach for information technology risk assessment through risk information technology framework
: The use of Information Technology (IT) in organizations is subject to various kinds of potential risks. Risk management is a key component of project management enables an organi...
Morteza Hatefi, Mehdi Fasanghari
IAJIT
2016
61views Biometrics» more  IAJIT 2016»
8 years 8 months ago
Design and implementation of a synchronous and asynchronous-based data replication technique in cloud computing
: Failures are usual rather exceptional in cloud computing environment. To access from the nearby site, the often used data should get replicated to multiple locations to compose t...
Kirubakaran Subramani, Valarmathy Shanmugasudaram,...
IAJIT
2016
48views Biometrics» more  IAJIT 2016»
8 years 8 months ago
A general characterization of representing and determining fuzzy spatial relations
: A considerable amount of fuzzy spatial data emerged in various applications leads to investigation of fuzzy spatial data and their fuzzy relations. Because of complex requirement...
Luyi Bai, Li Yan
IAJIT
2016
69views Biometrics» more  IAJIT 2016»
8 years 8 months ago
Spread spectrum based invertible watermarking for medical images using RNS and chaos
: In the current paper, we have presented a novel watermarking scheme with making watermark as robust while keeping the image fragile using Residue Number System (RNS) and Chaos. R...
Muhammad Tahir Naseem, Ijaz Mansoor Qureshi, Muham...
IAJIT
2016
51views Biometrics» more  IAJIT 2016»
8 years 8 months ago
Performance of random forest and SVM in face recognition
: In this study, we present the performance of Random Forest (RF) and Support Vector Machine (SVM) in facial recognition. Random Forest Tree (RFT) based algorithm is popular in com...
Emir Kremic, Abdulhamit Subasi
IAJIT
2016
45views Biometrics» more  IAJIT 2016»
8 years 8 months ago
Constraints aware and user friendly exam scheduling system
: Scheduling is a crucial task for schools, universities, and industries. It is a vital task for any system containing utilization of resources to fulfill a certain criterion. Util...
Mohammad Al-Haj Hassan, Osama Al-Haj Hassan
IAJIT
2016
48views Biometrics» more  IAJIT 2016»
8 years 8 months ago
Patching assignment optimization for security vulnerabilities
: This research is focusing on how IT support center applies the limited resources to elaborate a vulnerability patch in face of its disclosure in a system. We propose the most opt...
Shao-Ming Tong, Chien-Cheng Huang, Feng-Yu Lin, Ye...
IAJIT
2016
60views Biometrics» more  IAJIT 2016»
8 years 8 months ago
Efficient transmission of PKI certificates using elliptic curve cryptography and its variants
: The demand for wireless networks is increasing rapidly and it becomes essential to design existing Public-Key Infrastructure (PKI) useful for wireless devices. A PKI is a set of ...
Shivkumar Selvakumaraswamy, Umamaheswari Govindasw...
IAJIT
2016
60views Biometrics» more  IAJIT 2016»
8 years 8 months ago
Human visual perception-based image quality analyzer for assessment of contrast enhancement methods
: Absolute Mean Brightness Error (AMBE) and entropy are two popular Image Quality Analyzer (IQA) metrics used for assessment of Histogram Equalization (HE)-based contrast enhanceme...
Soong-Der Chen