Digital Library
Search: "[ author: al ]" (132)
-
Zaher Hamid Al-Tairi, Rahmita Wirza Rahmat, M. Iqbal Saripan, Puteri Suhaiza Sulaiman
Vol. 10, No. 2, pp. 283-299, Jun. 2014
10.3745/JIPS.02.0002
Keywords: Skin Segmentation, Thresholding Technique, Skin Detection, Color Space -
Anant M.Bagade, Sanjay N.Talbar
Vol. 10, No. 2, pp. 256-270, Jun. 2014
10.3745/JIPS.03.0005
Keywords: Morphed Steganography, Hiding Capacity, Imperceptibility, Stego Image Quality -
Khiat Salim, Belbachir Hafida, Rahal Sid Ahmed
Vol. 10, No. 1, pp. 145-161, Mar. 2014
10.3745/JIPS.2014.10.1.145
Keywords: Global Pattern, Maximum Entropy Method, Non-derivable Itemset, Itemset Inclusion-exclusion Model -
Oyuntungalag Chagnaadorj, Jiro Tanaka
Vol. 10, No. 1, pp. 92-102, Mar. 2014
10.3745/JIPS.2014.10.1.092
Keywords: Secure Device Pairing, Out-of-band Channel, Authentication, Gesture Input, Accelerometer -
Gawed M. Nagi, Rahmita Rahmat, Fatimah Khalid, Muhamad Taufik
Vol. 9, No. 1, pp. 173-188, Mar. 2013
10.3745/JIPS.2013.9.1.173
Keywords: Facial Expression Recognition (FER), Facial Features Detection, Facial Features Extraction, Cascade Classifier, LBP, One-Vs-Rest SVM -
Paul Fisher, Nawaf Aljohani, Jinsuk Baek
Vol. 13, No. 6, pp. 1554-1574, Dec. 2017
10.3745/JIPS.01.0021
Keywords: Pseudo Random, Linear Shift Registers, Finite Induction, Graphs, Hamiltonian Cycles -
Sangeeta Sabharwal, Manuj Aggarwal
Vol. 13, No. 5, pp. 1089-1102, Oct. 2017
10.3745/JIPS.04.0019
Keywords: Combinatorial Testing, Genetic Algorithm, Mixed Covering Arrays, Pairwise Testing, Test Set, t-way Testing -
Alim Murat, Turghun Osman, Yating Yang, Xi Zhou, Lei Wang, Xiao Li
Vol. 13, No. 4, pp. 716-730, Aug. 2017
10.3745/JIPS.02.0065
Keywords: Gender, Language Origin, Semantic Knowledge-based Model, Transliteration of Person Name -
Ruchika Malhotra, Ravi Jangra
Vol. 13, No. 4, pp. 778-804, Aug. 2017
10.3745/JIPS.04.0013
Keywords: Change Proneness, Empirical Validation, Machine Learning Techniques, Software Quality -
Bharti Nagpal, Naresh Chauhan, Nanhay Singh
Vol. 13, No. 4, pp. 689-702, Aug. 2017
10.3745/JIPS.03.0024
Keywords: Dynamic Analysis, Detection, Prevention, SQL Injection Attack, Static Analysis, Vulnerabilities