Digital Library
Search: "[ author: S ]" (658)
-
Leila Boussaad, Mohamed Benmohammed, Redha Benzid
Vol. 12, No. 3, pp. 392-409, Sep. 2016
10.3745/JIPS.02.0043
Keywords: Active Appearance Model, Age-Invariant, Face recognition, Kernel Fisher Analysis, 2D-Discrete Cosine Transform -
Sunghyu Han, Il-Yong Lee, Jung-Ho Ahn
Vol. 12, No. 3, pp. 381-391, Sep. 2016
10.3745/JIPS.02.0036
Keywords: Face Verification, Joint Bayesian Method, LBP, LFW Database, Two-Dimensional Joint Bayesian Method -
Kheira Zineb Bousmaha, Mustapha Kamel Rahmouni, Belkacem Kouninef, Lamia Belguith Hadrich
Vol. 12, No. 3, pp. 358-380, Sep. 2016
10.3745/JIPS.02.0041
Keywords: Alkhalil Morphological Analyzer, Approach to Multi-Criteria Decision (MCA), Arabic Language Processing (ALP), Augmented Transition Networks (ATNs), Contextual Exploration, Tagging, Diacritization, Disambiguation Method, Segmentation -
Ayman Al-Dmour, Mohammed Abuhelaleh, Ahmed Musa, Hasan Al-Shalabi
Vol. 12, No. 2, pp. 322-331, Jun. 2016
10.3745/JIPS.03.0051
Keywords: Bit-Level, Lempel-Ziv Coding, Lossless Image Compression, Source Encoding -
Gautham Sekar, Soumyadeep Bhattacharya
Vol. 12, No. 2, pp. 310-312, Jun. 2016
10.3745/JIPS.03.0021
Keywords: cryptanalysis, Hash Function, (Second) Preimage Attack -
Muhammad Sajjad Khan, Insoo Koo
Vol. 12, No. 2, pp. 295-309, Jun. 2016
10.3745/JIPS.03.0040
Keywords: cognitive radio, Contention-Aware Reporting, Cooperative Spectrum Sensing, Evidence Theory (D-S Theory), Multiple Energy Detector, Sequential Data Fusion -
Yasmine-Derdour, Bouabdellah-Kechar, Mohammed Fayc?al-Khelfi
Vol. 12, No. 2, pp. 275-294, Jun. 2016
10.3745/JIPS.03.0032
Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs -
Yan Li, Dongho Kim, Byeong-Seok Shin
Vol. 12, No. 2, pp. 263-274, Jun. 2016
10.3745/JIPS.04.0025
Keywords: Location-aware, NoSQL Database System, WBAN Monitoring System -
Samaneh Mashhadi
Vol. 12, No. 2, pp. 249-262, Jun. 2016
10.3745/JIPS.03.0050
Keywords: Non-Repudiation, Proxy Signature Scheme, Signature Scheme, Threshold Proxy Signature, Unforgeability -
Kuldeep Gurjar, Yang-Sae Moon
Vol. 12, No. 2, pp. 234-248, Jun. 2016
10.3745/JIPS.04.0024
Keywords: Data Provenance, Trustworthiness of Data, Data Quality, Trustworthiness Evaluation, Trust Score