- Advanced Data Compression Techniques
- Image and Signal Denoising Methods
- Semantic Web and Ontologies
- Advancements in Photolithography Techniques
- Software Engineering Research
- Software Reliability and Analysis Research
- Image Enhancement Techniques
- Service-Oriented Architecture and Web Services
- Neural Networks and Applications
- Software Engineering Techniques and Practices
- Face and Expression Recognition
- Infrared Target Detection Methodologies
- COVID-19 diagnosis using AI
- Face recognition and analysis
- Misinformation and Its Impacts
- Biometric Identification and Security
- Digital Filter Design and Implementation
- Advanced Image and Video Retrieval Techniques
- Algorithms and Data Compression
- Network Security and Intrusion Detection
- Advanced Image Processing Techniques
- Web Data Mining and Analysis
- Spam and Phishing Detection
- Integrated Circuits and Semiconductor Failure Analysis
- Distributed and Parallel Computing Systems
Jamia Millia Islamia
2013-2024
Pennsylvania State University
2019-2023
Islamia University of Bahawalpur
2007-2021
UPMC Altoona
2021
National Informatics Centre
2021
Guru Gobind Singh Indraprastha University
2014
University Of Information Technology
2014
University School
2014
D.A.V Centenary Dental College
2014
IEEE Computer Society
2014
Two of the most critical requirements in support producing reliable face-recognition systems are a large database facial images and testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through FERET establishment tests. To date, 14,126 from 1,199 individuals included database, which is divided into development sequestered portions database. In September 1996, administered third series primary objectives test were 1) assess state...
Two of the most critical requirements in support producing reliable face-recognition systems are a large database facial images and testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through FERET establishment tests. To date, 14,126 from 1199 individuals included database, which is divided into development sequestered portions. In September 1996, administered third series primary objectives test were (1) assess state art, (2)...
Two critical performance characterizations of biometric algorithms, including face recognition, are identification and verification. Identification recognition algorithms on the FERET tests has been previously reported. We report verification obtained from Sept96 test. The databases used to develop test usually smaller than that will be encountered in applications. examine effects size database for both
With the development of information society and network technology, people increasingly depend on found Internet. At same time, models diffusion Internet are changing as well. However, these experience problem due to fast technologies. There is no thorough research in regards latest their applications advantages. As a result, it essential have comprehensive study models. The primary goal this provide comparative existing such Ising model, Sznajd SIR SICR Game theory social networking...
Extracting useful information from the web is most significant issue of concern for realization semantic web. This may be achieved by several ways among which Web Usage Mining, Scrapping and Semantic Annotation plays an important role. mining enables to find out relevant results used extract meaningful discovery patterns kept back in servers. usage a type mines access routes/manners users visiting sites. scraping, another technique, process extracting HTML pages implemented using scripting...
The two main characteristics of a good encryption algorithm are: Security and Speed. Usually security algorithms have to be embedded in variety applications like e-banking, online shopping, mails etc. So they should fast as well secure different environments. In this paper, we do v/s performance analysis Two fish AES. First, will discuss issues both by considering their safety factor. Then study speed encrypting type data (text, image, audio) analyze terms throughput every on size RAMs....
An understanding towards genetics and epigenetics is essential to cope up with the paradigm shift which underway. Personalized medicine gene therapy will confluence days come. This review highlights traditional approaches as well current advancements in analysis of expression data from cancer perspective. Due improvements biometric instrumentation automation, it has become easier collect a lot experimental molecular biology. Analysis such extremely important leads knowledge discovery that...
Two key performance characterization of biometric algorithms (face recognition in particular) are (1) verification and (2) as a function database size composition. This is required for developing robust face successfully transitioning from the laboratory to real world. In this paper we present general protocol apply it results Sep96 FERET test, discuss on effects variability identification performance.
Digital audio watermarking technique is a process of embedding perceptually transparent digital information into an original signal. Watermarking can be fragile or non depends upon the user's requirements. The main concern to prove ownership as well protection embedded information. This paper gives brief overview existing techniques, their applications and future prospects watermarking.
Due to the explosion of information/knowledge on web and wide use search engines for desired information,the role knowledge management(KM) is becoming more significant in an organization.Knowledge Management Organization used create ,capture, store, share, retrieve manage information efficiently.The semantic web, intelligent meaningful tend provide a promising platform management systems vice versa, since they have potential give each other real substance machine-understandable resources...