Table of Contents
Peer-Reviewed Articles
| Contour-based Pedestrian Detection with Foreground Distribution Trend Filtering and Tracking | |
| Kiat Siong Ng, Min-Chun Hu, Yu-Jung Hsiao, Kuang-Yu Nien, Pei-Yin Chen | 33-37 |
| Blueprint for Cyber Security Zone Modeling | |
| Andrew Gontarczyk, Phil McMillan, Chris Pavlovski | 38-45 |
| Stability of Individuals in a Fingerprint System across Force Levels - An Introduction to the Stability Score Index | |
| Kevin O'Connor, Stephen Elliott, Mathias Sutton, Michael Dyrenfurth | 46-53 |
| Signature Forgery and the Forger - An Assessment of Influence on Handwritten Signature Production | |
| Alex Morton, William Reid, Colin Buntin, Michael Brockly, Joe O'Neill, Richard Guest | 54-58 |
| Bee Colony Algorithm for Proctors Assignment | |
| Nashat Mansour, Mohamad Kassem Taha | 59-63 |
This work is licensed under a Creative Commons Attribution 3.0 License.
![]()