Digital Library
Search: "[ keyword: Age ]" (231)
-
Sang-Yong Choi, Daehyeok Kim, Yong-Min Kim
Vol. 12, No. 3, pp. 422-435, Sep. 2016
10.3745/JIPS.03.0045
Keywords: Drive-by download, Malware Distribution Network, Webpage Link Analysis, Web security -
Leila Boussaad, Mohamed Benmohammed, Redha Benzid
Vol. 12, No. 3, pp. 392-409, Sep. 2016
10.3745/JIPS.02.0043
Keywords: Active Appearance Model, Age-Invariant, Face recognition, Kernel Fisher Analysis, 2D-Discrete Cosine Transform -
Kheira Zineb Bousmaha, Mustapha Kamel Rahmouni, Belkacem Kouninef, Lamia Belguith Hadrich
Vol. 12, No. 3, pp. 358-380, Sep. 2016
10.3745/JIPS.02.0041
Keywords: Alkhalil Morphological Analyzer, Approach to Multi-Criteria Decision (MCA), Arabic Language Processing (ALP), Augmented Transition Networks (ATNs), Contextual Exploration, Tagging, Diacritization, Disambiguation Method, Segmentation -
Ayman Al-Dmour, Mohammed Abuhelaleh, Ahmed Musa, Hasan Al-Shalabi
Vol. 12, No. 2, pp. 322-331, Jun. 2016
10.3745/JIPS.03.0051
Keywords: Bit-Level, Lempel-Ziv Coding, Lossless Image Compression, Source Encoding -
Gautham Sekar, Soumyadeep Bhattacharya
Vol. 12, No. 2, pp. 310-312, Jun. 2016
10.3745/JIPS.03.0021
Keywords: cryptanalysis, Hash Function, (Second) Preimage Attack -
Moneeb Gohar, Seok-Joo Koh
Vol. 12, No. 2, pp. 196-213, Jun. 2016
10.3745/JIPS.03.0037
Keywords: Comparison, HIP, LTE, LISP, MIP, Mobility Management, PMIP, SAE -
Moulkheir Naoui, Saïd Mahmoudi, Ghalem Belalem
Vol. 12, No. 1, pp. 149-168, Mar. 2016
10.3745/JIPS.02.0039
Keywords: Active Appearance Model, Data Parallelism, Deformable Model, Distributed Image Processing, Parallel Image Processing, Segmentation -
Gran Badshah, Siau-Chuin Liew, Jasni Mohamad Zain, Mushtaq Ali
Vol. 11, No. 4, pp. 601-615, Dec. 2015
10.3745/JIPS.03.0044
Keywords: Lossless Recovery, Tamper Localization, Telemedicine, watermarking, Whole Image, WITALLOR -
Nawel Bendimerad, Bouabdellah Kechar
Vol. 11, No. 4, pp. 509-527, Dec. 2015
10.3745/JIPS.03.0034
Keywords: coverage, Fault Tolerance, Field of View, Obstacles Avoidance, Scheduling, Simulation, Wireless Video Sensor Networks -
Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki, Driss Aboutajdine
Vol. 11, No. 4, pp. 495-508, Dec. 2015
10.3745/JIPS.02.0032
Keywords: copyright protection, Mammograms, Medical Image, Robust Watermarking, Visual Cryptography