Sciweavers

22 search results - page 3 / 5
» jips 2010
Sort
View
JIPS
2010
216views more  JIPS 2010»
12 years 11 months ago
Fingerprint Detection Using Canny Filter and DWT, a New Approach
This paper proposes two new methods to detect the fingerprints of different persons based on one-dimensional and two-dimensional discrete wavelet transformations (DWTs). Recent lit...
Md. Imdadul Islam, Nasima Begum, Mahbubul Alam, M....
JIPS
2010
110views more  JIPS 2010»
12 years 11 months ago
A License Audit Model for Secure DRM Systems in IP-based Environments
Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by c...
Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin
JIPS
2010
160views more  JIPS 2010»
12 years 11 months ago
A Regression Test Selection and Prioritization Technique
Regression testing is a very costly process performed primarily as a software maintenance activity. It is the process of retesting the modified parts of the software and ensuring t...
Ruchika Malhotra, Arvinder Kaur, Yogesh Singh
JIPS
2010
154views more  JIPS 2010»
12 years 11 months ago
Mining Spatio-Temporal Patterns in Trajectory Data
Spatio-temporal patterns extracted from historical trajectories of moving objects reveal important knowledge about movement behavior for high quality LBS services. Existing approac...
Juyoung Kang 0002, Hwan-Seung Yong
JIPS
2010
273views more  JIPS 2010»
12 years 11 months ago
Hiding Secret Data in an Image Using Codeword Imitation
This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to...
Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai