Table of Contents
Peer-Reviewed Articles
Contour-based Pedestrian Detection with Foreground Distribution Trend Filtering and Tracking | |
Kiat Siong Ng, Min-Chun Hu, Yu-Jung Hsiao, Kuang-Yu Nien, Pei-Yin Chen | 33-37 |
Blueprint for Cyber Security Zone Modeling | |
Andrew Gontarczyk, Phil McMillan, Chris Pavlovski | 38-45 |
Stability of Individuals in a Fingerprint System across Force Levels - An Introduction to the Stability Score Index | |
Kevin O'Connor, Stephen Elliott, Mathias Sutton, Michael Dyrenfurth | 46-53 |
Signature Forgery and the Forger - An Assessment of Influence on Handwritten Signature Production | |
Alex Morton, William Reid, Colin Buntin, Michael Brockly, Joe O'Neill, Richard Guest | 54-58 |
Bee Colony Algorithm for Proctors Assignment | |
Nashat Mansour, Mohamad Kassem Taha | 59-63 |
This work is licensed under a Creative Commons Attribution 3.0 License.
IT in Industry © (2012 - ) · http://www.it-in-industry.com · ISSN (Online): 2203-1731; ISSN (Print): 2204-0595