Syed A. Rizvi

ORCID: 0000-0001-8641-4383
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Data Compression Techniques
  • Image and Signal Denoising Methods
  • Semantic Web and Ontologies
  • Advancements in Photolithography Techniques
  • Software Engineering Research
  • Software Reliability and Analysis Research
  • Image Enhancement Techniques
  • Service-Oriented Architecture and Web Services
  • Neural Networks and Applications
  • Software Engineering Techniques and Practices
  • Face and Expression Recognition
  • Infrared Target Detection Methodologies
  • COVID-19 diagnosis using AI
  • Face recognition and analysis
  • Misinformation and Its Impacts
  • Biometric Identification and Security
  • Digital Filter Design and Implementation
  • Advanced Image and Video Retrieval Techniques
  • Algorithms and Data Compression
  • Network Security and Intrusion Detection
  • Advanced Image Processing Techniques
  • Web Data Mining and Analysis
  • Spam and Phishing Detection
  • Integrated Circuits and Semiconductor Failure Analysis
  • Distributed and Parallel Computing Systems

Jamia Millia Islamia
2013-2024

Pennsylvania State University
2019-2023

Islamia University of Bahawalpur
2007-2021

UPMC Altoona
2021

National Informatics Centre
2021

Guru Gobind Singh Indraprastha University
2014

University Of Information Technology
2014

University School
2014

D.A.V Centenary Dental College
2014

IEEE Computer Society
2014

Two of the most critical requirements in support producing reliable face-recognition systems are a large database facial images and testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through FERET establishment tests. To date, 14,126 from 1,199 individuals included database, which is divided into development sequestered portions database. In September 1996, administered third series primary objectives test were 1) assess state...

10.1109/34.879790 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2000-01-01

Two of the most critical requirements in support producing reliable face-recognition systems are a large database facial images and testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through FERET establishment tests. To date, 14,126 from 1199 individuals included database, which is divided into development sequestered portions. In September 1996, administered third series primary objectives test were (1) assess state art, (2)...

10.1109/cvpr.1997.609311 article EN 2002-11-22

Two critical performance characterizations of biometric algorithms, including face recognition, are identification and verification. Identification recognition algorithms on the FERET tests has been previously reported. We report verification obtained from Sept96 test. The databases used to develop test usually smaller than that will be encountered in applications. examine effects size database for both

10.1109/afgr.1998.670924 article EN 1998-01-01

With the development of information society and network technology, people increasingly depend on found Internet. At same time, models diffusion Internet are changing as well. However, these experience problem due to fast technologies. There is no thorough research in regards latest their applications advantages. As a result, it essential have comprehensive study models. The primary goal this provide comparative existing such Ising model, Sznajd SIR SICR Game theory social networking...

10.1016/j.jksuci.2019.08.008 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2019-08-23

Extracting useful information from the web is most significant issue of concern for realization semantic web. This may be achieved by several ways among which Web Usage Mining, Scrapping and Semantic Annotation plays an important role. mining enables to find out relevant results used extract meaningful discovery patterns kept back in servers. usage a type mines access routes/manners users visiting sites. scraping, another technique, process extracting HTML pages implemented using scripting...

10.1109/cicn.2011.97 article EN International Conference on Computational Intelligence and Communication Networks 2011-10-01

The two main characteristics of a good encryption algorithm are: Security and Speed. Usually security algorithms have to be embedded in variety applications like e-banking, online shopping, mails etc. So they should fast as well secure different environments. In this paper, we do v/s performance analysis Two fish AES. First, will discuss issues both by considering their safety factor. Then study speed encrypting type data (text, image, audio) analyze terms throughput every on size RAMs....

10.1109/csnt.2011.160 article EN International Conference on Communication Systems and Network Technologies 2011-06-01

10.1016/j.bbadis.2022.166561 article EN publisher-specific-oa Biochimica et Biophysica Acta (BBA) - Molecular Basis of Disease 2022-09-29

An understanding towards genetics and epigenetics is essential to cope up with the paradigm shift which underway. Personalized medicine gene therapy will confluence days come. This review highlights traditional approaches as well current advancements in analysis of expression data from cancer perspective. Due improvements biometric instrumentation automation, it has become easier collect a lot experimental molecular biology. Analysis such extremely important leads knowledge discovery that...

10.1109/tcbb.2014.2312002 article EN IEEE/ACM Transactions on Computational Biology and Bioinformatics 2014-03-18

Two key performance characterization of biometric algorithms (face recognition in particular) are (1) verification and (2) as a function database size composition. This is required for developing robust face successfully transitioning from the laboratory to real world. In this paper we present general protocol apply it results Sep96 FERET test, discuss on effects variability identification performance.

10.1109/cvpr.1998.698701 article EN 2002-11-27

Digital audio watermarking technique is a process of embedding perceptually transparent digital information into an original signal. Watermarking can be fragile or non depends upon the user's requirements. The main concern to prove ownership as well protection embedded information. This paper gives brief overview existing techniques, their applications and future prospects watermarking.

10.1109/iccct.2013.6749625 article EN 2013-09-01

Due to the explosion of information/knowledge on web and wide use search engines for desired information,the role knowledge management(KM) is becoming more significant in an organization.Knowledge Management Organization used create ,capture, store, share, retrieve manage information efficiently.The semantic web, intelligent meaningful tend provide a promising platform management systems vice versa, since they have potential give each other real substance machine-understandable resources...

10.5121/ijwest.2010.1402 article EN International journal of Web & Semantic Technology 2010-10-30
Coming Soon ...