Sciweavers

IAJIT
2016
52views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Adaptive automata-based model for iterated n-player's prisoner's dilemma
: In this paper, we present a new technique of representing the player’s strategies by adaptive automata, which can handle complex strategies in large populations effectively. Th...
Sally Almanasra, Khaled Suwais, Muhammad Rafie
90
Voted
IAJIT
2016
45views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Investigation and analysis of research gate user's activities using neural networks
: Online Social Networks (OSNs) have been proliferating in the past decade as general-purpose public networks. Billions of user’s are currently subscribing by uploading, download...
Omar AlHeyasat
106
Voted
IAJIT
2016
52views Biometrics» more  IAJIT 2016»
9 years 12 months ago
WPFP-PCA: weighted parallel fixed point PCA Face recognition
: Principal Component Analysis (PCA) is one of the feature extraction techniques, commonly used in human facial recognition systems. PCA yields high accuracy rates when requiring l...
Chakchai So-In, Kanokmon Rujirakul
IAJIT
2016
60views Biometrics» more  IAJIT 2016»
9 years 12 months ago
A DEA-based approach for information technology risk assessment through risk information technology framework
: The use of Information Technology (IT) in organizations is subject to various kinds of potential risks. Risk management is a key component of project management enables an organi...
Morteza Hatefi, Mehdi Fasanghari
IAJIT
2016
61views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Design and implementation of a synchronous and asynchronous-based data replication technique in cloud computing
: Failures are usual rather exceptional in cloud computing environment. To access from the nearby site, the often used data should get replicated to multiple locations to compose t...
Kirubakaran Subramani, Valarmathy Shanmugasudaram,...
IAJIT
2016
48views Biometrics» more  IAJIT 2016»
9 years 12 months ago
A general characterization of representing and determining fuzzy spatial relations
: A considerable amount of fuzzy spatial data emerged in various applications leads to investigation of fuzzy spatial data and their fuzzy relations. Because of complex requirement...
Luyi Bai, Li Yan
104
Voted
IAJIT
2016
69views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Spread spectrum based invertible watermarking for medical images using RNS and chaos
: In the current paper, we have presented a novel watermarking scheme with making watermark as robust while keeping the image fragile using Residue Number System (RNS) and Chaos. R...
Muhammad Tahir Naseem, Ijaz Mansoor Qureshi, Muham...
IAJIT
2016
51views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Performance of random forest and SVM in face recognition
: In this study, we present the performance of Random Forest (RF) and Support Vector Machine (SVM) in facial recognition. Random Forest Tree (RFT) based algorithm is popular in com...
Emir Kremic, Abdulhamit Subasi
IAJIT
2016
45views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Constraints aware and user friendly exam scheduling system
: Scheduling is a crucial task for schools, universities, and industries. It is a vital task for any system containing utilization of resources to fulfill a certain criterion. Util...
Mohammad Al-Haj Hassan, Osama Al-Haj Hassan
IAJIT
2016
48views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Patching assignment optimization for security vulnerabilities
: This research is focusing on how IT support center applies the limited resources to elaborate a vulnerability patch in face of its disclosure in a system. We propose the most opt...
Shao-Ming Tong, Chien-Cheng Huang, Feng-Yu Lin, Ye...