Sciweavers

IAJIT
2016
51views Biometrics» more  IAJIT 2016»
8 years 1 months ago
Performance of random forest and SVM in face recognition
: In this study, we present the performance of Random Forest (RF) and Support Vector Machine (SVM) in facial recognition. Random Forest Tree (RFT) based algorithm is popular in com...
Emir Kremic, Abdulhamit Subasi
IAJIT
2016
45views Biometrics» more  IAJIT 2016»
8 years 1 months ago
Constraints aware and user friendly exam scheduling system
: Scheduling is a crucial task for schools, universities, and industries. It is a vital task for any system containing utilization of resources to fulfill a certain criterion. Util...
Mohammad Al-Haj Hassan, Osama Al-Haj Hassan
IAJIT
2016
48views Biometrics» more  IAJIT 2016»
8 years 1 months ago
Patching assignment optimization for security vulnerabilities
: This research is focusing on how IT support center applies the limited resources to elaborate a vulnerability patch in face of its disclosure in a system. We propose the most opt...
Shao-Ming Tong, Chien-Cheng Huang, Feng-Yu Lin, Ye...
IAJIT
2016
60views Biometrics» more  IAJIT 2016»
8 years 1 months ago
Efficient transmission of PKI certificates using elliptic curve cryptography and its variants
: The demand for wireless networks is increasing rapidly and it becomes essential to design existing Public-Key Infrastructure (PKI) useful for wireless devices. A PKI is a set of ...
Shivkumar Selvakumaraswamy, Umamaheswari Govindasw...
IAJIT
2016
60views Biometrics» more  IAJIT 2016»
8 years 1 months ago
Human visual perception-based image quality analyzer for assessment of contrast enhancement methods
: Absolute Mean Brightness Error (AMBE) and entropy are two popular Image Quality Analyzer (IQA) metrics used for assessment of Histogram Equalization (HE)-based contrast enhanceme...
Soong-Der Chen
IAJIT
2016
45views Biometrics» more  IAJIT 2016»
8 years 1 months ago
Designing a fuzzy-logic based trust and reputation model for secure resource allocation in cloud computing
: To plan and improve a fuzzy logic and neural network based trust and reputation model for safe resource allocation in cloud computing is the most important motto of this research...
Kamalanathan Chandran, Valarmathy Shanmugasudaram,...