Vol 3, No 2 (2015)

IT in Industry

Table of Contents

Peer-Reviewed Articles

Contour-based Pedestrian Detection with Foreground Distribution Trend Filtering and Tracking PDF
Kiat Siong Ng, Min-Chun Hu, Yu-Jung Hsiao, Kuang-Yu Nien, Pei-Yin Chen 33-37
Blueprint for Cyber Security Zone Modeling PDF
Andrew Gontarczyk, Phil McMillan, Chris Pavlovski 38-45
Stability of Individuals in a Fingerprint System across Force Levels - An Introduction to the Stability Score Index PDF
Kevin O'Connor, Stephen Elliott, Mathias Sutton, Michael Dyrenfurth 46-53
Signature Forgery and the Forger - An Assessment of Influence on Handwritten Signature Production PDF
Alex Morton, William Reid, Colin Buntin, Michael Brockly, Joe O'Neill, Richard Guest 54-58
Bee Colony Algorithm for Proctors Assignment PDF
Nashat Mansour, Mohamad Kassem Taha 59-63


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

IT in Innovation IT in Business IT in Engineering IT in Health IT in Science IT in Design IT in Fashion

IT in Industry © (2012 - ) · http://www.it-in-industry.com · ISSN (Online): 2203-1731; ISSN (Print): 2204-0595