Sasan Karamizadeh - Academia.edu (original) (raw)

Papers by Sasan Karamizadeh

Research paper thumbnail of Comparison of Data Hiding Techniques for Video Watermarking Applications

2022 7th International Conference on Computer and Communication Systems (ICCCS)

Research paper thumbnail of Smart City Concepts and Dimensions

Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City

In the fresh age of urbanization, and granted that the world's urban population encroaches 50... more In the fresh age of urbanization, and granted that the world's urban population encroaches 50 percent, the size and speed of urbanization are accelerating into what is referred to as the second wave of urbanization. In the meanwhile, the growth of urbanization has taken on a more rapid pace than in the past, since the start of the third millennium, which is the epoch of the rule of information technology in different fields of urban life, which may be named the third wave of urbanization. In this article we will talk about the components that make a city smart. A set of common multidimensional components is identified under the concept of smart city and the key factors of smart city's successful initiative are identified by studying the definitions of smart city's current work and the sort of concepts similar to smart city. This report introduces the strategic principles which aligned with the three main dimensions of the smart city namely (technology, people, and institutions): The integration of technology-mediated infrastructures and services, social learning to strengthen human infrastructure and organization to improve institutional and citizen interaction.

Research paper thumbnail of New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network

Journal of Information and Communication Technology, Oct 1, 2020

Research paper thumbnail of Threshold based skin color classification

Journal of Telecommunication, Electronic and Computer Engineering, 2017

In this paper, we presented a new formula for skin classification. The proposed formula can overc... more In this paper, we presented a new formula for skin classification. The proposed formula can overcome sensitivity to noise. Our approach was based multi-skin color Hue, Saturation, and Value color space and multi-level segmentation. Skin regions were extracted using three skin color classes, namely the Caucasoid, Mongolid and Nigroud. Moreover, in this formula, we adopted Gaussian-based weight k-NN algorithm for skin classification. The experiment result shows that the best result was achieved for Caucasoid class with 84.29 percent fmeasure.

Research paper thumbnail of Enhancement of Illumination scheme for Adult Image Recognition

Biometric-based techniques have emerged as the most promising option for individual recognition. ... more Biometric-based techniques have emerged as the most promising option for individual recognition. This task is still a challenge for computer vision systems. Several approaches to adult image recognition, which include the deep neural network and traditional classifier, have been proposed. Different image condition factors such as expressions, occlusion, poses, and illuminations affect the facial recognition system. A reasonable amount of illumination variations between the gallery and probe images need to be taken into account in adult image recognition algorithms. In the context of adult image verification, illumination variation plays a vital role and this factor will most likely result in misclassification. Different architectures and different parameters have been tested in order to improve the classification’s accuracy. This proposed method contains four steps, which begin with Fuzzy Deep Neural Network Segmentation. This step is employed in order to segment an image based on i...

Research paper thumbnail of Race classification using gaussian-based weight K-nn algorithm for face recognition

The Journal of Engineering Research, 2018

One of the greatest challenges in facial recognition systems is to recognize faces around differe... more One of the greatest challenges in facial recognition systems is to recognize faces around different race and illuminations. Chromaticity is an essential factor in facial recognition and shows the intensity of the color in a pixel, it can greatly vary depending on the lighting conditions. The race classification scheme proposed which is Gaussian based-weighted K-Nearest Neighbor classifier in this paper, has very sensitive to illumination intensity. The main idea is first to identify the minority class instances in the training data and then generalize them to Gaussian function as concept for the minority class. By using combination of K-NN algorithm with Gaussian formula for race classification. In this paper, image processing is divided into two phases. The first is preprocessing phase. There are three preprocessing comprises of auto contrast balance, noise reduction and auto-color balancing. The second phase is face processing which contains six steps; face detection, illumination...

Research paper thumbnail of Skin Classification for Adult Image Recognition Based on Combination of Gaussian and Weight-KNN

Nowadays, literature has been explored adult image detection automatic which is a replacement for... more Nowadays, literature has been explored adult image detection automatic which is a replacement for human action in the boring task of moderating online content. One of the mistake scenes with high skin exposure, such as people swimming and get a tan, can be have many wrong alarms. Some condition factors like illumination, occlusion, and poses are more important to image-recognize which any system has to able to recognize. Reasonable amounts of illumination variation between the gallery and probe images need to be taken into account in image recognition algorithms. In the context of image verification, two items are important; illumination variation and skin classification, and these two factors will most likely result in misclassification. There is a lack of research in combining two factors of imaging condition for illuminating and determining skin in image recognition system. The purpose of this paper is to determine and design the proposed scheme to solve illumination variation an...

Research paper thumbnail of Identifying Benefits and risks associated with utilizing cloud computing

Cloud computing is an emerging computing model where IT and computing operations are delivered as... more Cloud computing is an emerging computing model where IT and computing operations are delivered as services in highly scalable and cost effective manner. Recently, embarking this new model in business has become popular. Companies in diverse sectors intend to leverage cloud computing architecture, platforms and applications in order to gain higher competitive advantages. Likewise other models, cloud computing brought advantages to attract business but meanwhile fostering cloud has led to some risks, which can cause major impacts if business does not plan for mitigation. This paper surveys the advantages of cloud computing and in contrast the risks associated using them. Finally we conclude that a well-defined risk management program that focused on cloud computing is an essential part of gaining value from benefits of cloud computing.

Research paper thumbnail of The Application of Fusion of Heterogeneous Meta Classifiers to Enhance Protein Fold Prediction Accuracy

Lecture Notes in Computer Science, 2011

Protein fold prediction problem is considered as one of the most challenging tasks for molecular ... more Protein fold prediction problem is considered as one of the most challenging tasks for molecular biology and one of the biggest unsolved problems for science. Recently, varieties of classification approaches have been proposed to solve this problem. In this study, a fusion of heterogeneous Meta classifiers namely: LogitBoost, Random Forest, and Rotation Forest is proposed to solve this problem. The proposed approach aims at enhancing the protein fold prediction accuracy by enforcing diversity among its individual members by ...

Research paper thumbnail of Implementation and Evaluation of Lightweight Encryption Algorithms Suitable for RFID

Journal of Next Generation Information Technology, 2013

ABSTRACT Export Date: 16 April 2013, Source: Scopus

Research paper thumbnail of Taxonomy of Filtering Based Illumination Normalization for Face Recognition

Journal of Telecommunication, Electronic and Computer Engineering, 2017

Presently, the difficulty in managing illumination over the face recognition techniques and smoot... more Presently, the difficulty in managing illumination over the face recognition techniques and smooth filters has emerged as one of the biggest challenges. This is due to differences between face images created by illuminations which are always bigger than the inter-person that usually be used for identities’ recognition. No doubt, the use of illumination technique for face recognition is much more popular with a greater number of users in various applications in these days. It is able to make applications that come with face recognition as a non-intrusive biometric feature becoming executable and utilizable. There are tremendous efforts put in developing the illumination and face recognition by which numerous methods had already been introduced. However, further considerations are required such as the deficiencies in comprehending the sub-spaces in illuminations pictures, intractability in face modelling as well as the tedious mechanisms of face surface reflections as far as face reco...

Research paper thumbnail of SIKM – a smart cryptographic key management framework

Open Computer Science, 2022

For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using ... more For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management. Many key management schemes are devised that each one is suitable for a specific range of applications. However, these schemes have some common drawbacks like the hardness of key generation and distribution, key storage, attacks, and traffic load. In this article, a key management framework is proposed, which is attack resistant and transforms the current customary key management workflow to enhance security and reduce weaknesses. The main features of the proposed framework are eliminating key storage, smart attack resistant feature, reducing multiple-times key distribution to just one-time interpreter distribution, and having short key intervals – minutely, hourly, and daily. Moreover, the key revocation process happens automatically and with no ...

Research paper thumbnail of Adult content image recognition by Boltzmann machine limited and deep learning

Evolutionary Intelligence

Adult content images have a detrimental effect on Internet users, a significant number of whom ar... more Adult content images have a detrimental effect on Internet users, a significant number of whom are minors. Therefore, it is essential to control and detecting adult content images using multimedia processing and computer vision techniques. Previous studies have typically focused on manual-engineered visual features that may be difficult to detect and analyze. This paper presents a new model that employs deep convolutional neural networks within a Gaussian-Bernoulli limited-time, for adult content image recognition of a wide variety in a precise and effective manner. There are various layers within Convolutional Neural Networks for feature extraction and classification. Gaussian-Bernoulli limited-time was used for feature extraction to describe the images, and these features were summarized using the Boltzmann machine limited in the feature summary phase. The benefit of such an approach is convenience in carrying out feature extraction. Additionally, when tested on the most modern cr...

Research paper thumbnail of Information Security Awareness Behavior : A Conceptual Model for Cloud

INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY

Cloud computing has changed the whole picture that distributed computing used to present such as ... more Cloud computing has changed the whole picture that distributed computing used to present such as Grid computing, server client computing. Despite Cloud offers great benefits, it also introduces a myriad of security threats to the information and data which is now being ported from on-premises to off-premises. These security threats must be overcome in order to get full benefit from this new computing exemplar. This paper identifies the importance of awareness behaviour in context of information security for cloud. We investigate four important factors of security awareness behaviour that should be considered when organisations intend to improve their security toward cloud computing environment based on awareness-focused programs. Finally we conclude that a well-structured awareness program that positively affect the level of self-efficacy, security practice care behaviour, security awareness technology behaviour and intention will improve the level of total information security in ...

Research paper thumbnail of Face Recognition via Taxonomy of Illumination Normalization

Intelligent Systems Reference Library, 2016

Research paper thumbnail of An overview of objectionable image detection

2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), 2015

Research paper thumbnail of A Review on Techniques of Illumination in Face Recognition

International Journal of Engineering & Technology Sciences

Face recognition under varying illumination is one of the challenging problems in real-time appli... more Face recognition under varying illumination is one of the challenging problems in real-time applications. Numerous methods have been developed by the research community to handle the problem. Existing surveys of methods are either too old or do not cover performance analysis of illumination invariant methods. This review summarizes the concepts related to the main challenge experienced by the present face recognition techniques and smooth filters are the difficulty in managing illumination. The differences in face images that are created by illumination are normally bigger compared to the differences in inter-person that is utilized to differentiate identities. However, face recognition over illumination has more uses in a lot of applications that deal with subjects that are not cooperative where the highest potential of the face recognition as a non-intrusive biometric feature can be executed and utilized. On the other hand, there are some anxieties with face recognition and illumi...

Research paper thumbnail of Filtering Based Illumination Normalization Techniques for Face Recognition

TELKOMNIKA Indonesian Journal of Electrical Engineering, 2015

The main challenge experienced by the present face recognition techniques and smooth filters are ... more The main challenge experienced by the present face recognition techniques and smooth filters are the difficulty in managing illumination. The differences in face images that are created by illumination are normally bigger compared to the differences in inter-person that is utilized to differentiate identities. However, face recognition over illumination has more uses in a lot of applications that deal with subjects that are not cooperative where the highest potential of the face recognition as a non-intrusive biometric feature can be executed and utilized. A lot of work has been put into the research and development of illumination and face recognition in the present era and a lot of critical methods have been introduced. Nevertheless, there are some concerns with face recognition and illumination that require further considerations which include the deficiencies in comprehending the sub-spaces in illumination pictures, problems with intractability in face modelling and complicated mechanisms of face surface reflections.

Research paper thumbnail of Information Security Awareness Behaviour: A Conceptual Model for Cloud

Cloud computing has changed the whole picture that distributed computing used to present such as ... more Cloud computing has changed the whole picture that distributed computing used to present such as Grid computing, server client computing. Despite Cloud offers great benefits, it also introduces a myriad of security threats to the information and data which is now being ported from on-premises to off-premises. These security threats must be overcome in order to get full benefit from this new computing exemplar. This paper identifies the importance of awareness behaviour in context of information security for cloud. We investigate four important factors of security awareness behaviour that should be considered when organisations intend to improve their security toward cloud computing environment based on awareness-focused programs. Finally we conclude that a well-structured awareness program that positively affect the level of self-efficacy, security practice care behaviour, security awareness technology behaviour and intention will improve the level of total information security in c...

Research paper thumbnail of Face Recognition by Implying Illumination Techniques – A Review Paper

ABSTRACT The purpose of this review paper is to present the technical basis for establishing the ... more ABSTRACT The purpose of this review paper is to present the technical basis for establishing the quality criteria by using the face recognition techniques and smooth filters. The metamorphoses in face images are formed by illumination, in general they show the better quality compared with the metamorphoses in inter-person by differentiating the identities. Conversely, face recognition over illumination possesses several applications in dealing with a non intrusive biometric feature. Several attempts have been done regarding to the research, nevertheless, some of them are including the deficiencies in comprehending the subspaces in illumination pictures, challenging with intractability in face modelling and complicated mechanisms of face surface reflections. This study aims to offer a crucial review of illumination techniques, and image-based on illumination variation in face recognition.

Research paper thumbnail of Comparison of Data Hiding Techniques for Video Watermarking Applications

2022 7th International Conference on Computer and Communication Systems (ICCCS)

Research paper thumbnail of Smart City Concepts and Dimensions

Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City

In the fresh age of urbanization, and granted that the world's urban population encroaches 50... more In the fresh age of urbanization, and granted that the world's urban population encroaches 50 percent, the size and speed of urbanization are accelerating into what is referred to as the second wave of urbanization. In the meanwhile, the growth of urbanization has taken on a more rapid pace than in the past, since the start of the third millennium, which is the epoch of the rule of information technology in different fields of urban life, which may be named the third wave of urbanization. In this article we will talk about the components that make a city smart. A set of common multidimensional components is identified under the concept of smart city and the key factors of smart city's successful initiative are identified by studying the definitions of smart city's current work and the sort of concepts similar to smart city. This report introduces the strategic principles which aligned with the three main dimensions of the smart city namely (technology, people, and institutions): The integration of technology-mediated infrastructures and services, social learning to strengthen human infrastructure and organization to improve institutional and citizen interaction.

Research paper thumbnail of New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network

Journal of Information and Communication Technology, Oct 1, 2020

Research paper thumbnail of Threshold based skin color classification

Journal of Telecommunication, Electronic and Computer Engineering, 2017

In this paper, we presented a new formula for skin classification. The proposed formula can overc... more In this paper, we presented a new formula for skin classification. The proposed formula can overcome sensitivity to noise. Our approach was based multi-skin color Hue, Saturation, and Value color space and multi-level segmentation. Skin regions were extracted using three skin color classes, namely the Caucasoid, Mongolid and Nigroud. Moreover, in this formula, we adopted Gaussian-based weight k-NN algorithm for skin classification. The experiment result shows that the best result was achieved for Caucasoid class with 84.29 percent fmeasure.

Research paper thumbnail of Enhancement of Illumination scheme for Adult Image Recognition

Biometric-based techniques have emerged as the most promising option for individual recognition. ... more Biometric-based techniques have emerged as the most promising option for individual recognition. This task is still a challenge for computer vision systems. Several approaches to adult image recognition, which include the deep neural network and traditional classifier, have been proposed. Different image condition factors such as expressions, occlusion, poses, and illuminations affect the facial recognition system. A reasonable amount of illumination variations between the gallery and probe images need to be taken into account in adult image recognition algorithms. In the context of adult image verification, illumination variation plays a vital role and this factor will most likely result in misclassification. Different architectures and different parameters have been tested in order to improve the classification’s accuracy. This proposed method contains four steps, which begin with Fuzzy Deep Neural Network Segmentation. This step is employed in order to segment an image based on i...

Research paper thumbnail of Race classification using gaussian-based weight K-nn algorithm for face recognition

The Journal of Engineering Research, 2018

One of the greatest challenges in facial recognition systems is to recognize faces around differe... more One of the greatest challenges in facial recognition systems is to recognize faces around different race and illuminations. Chromaticity is an essential factor in facial recognition and shows the intensity of the color in a pixel, it can greatly vary depending on the lighting conditions. The race classification scheme proposed which is Gaussian based-weighted K-Nearest Neighbor classifier in this paper, has very sensitive to illumination intensity. The main idea is first to identify the minority class instances in the training data and then generalize them to Gaussian function as concept for the minority class. By using combination of K-NN algorithm with Gaussian formula for race classification. In this paper, image processing is divided into two phases. The first is preprocessing phase. There are three preprocessing comprises of auto contrast balance, noise reduction and auto-color balancing. The second phase is face processing which contains six steps; face detection, illumination...

Research paper thumbnail of Skin Classification for Adult Image Recognition Based on Combination of Gaussian and Weight-KNN

Nowadays, literature has been explored adult image detection automatic which is a replacement for... more Nowadays, literature has been explored adult image detection automatic which is a replacement for human action in the boring task of moderating online content. One of the mistake scenes with high skin exposure, such as people swimming and get a tan, can be have many wrong alarms. Some condition factors like illumination, occlusion, and poses are more important to image-recognize which any system has to able to recognize. Reasonable amounts of illumination variation between the gallery and probe images need to be taken into account in image recognition algorithms. In the context of image verification, two items are important; illumination variation and skin classification, and these two factors will most likely result in misclassification. There is a lack of research in combining two factors of imaging condition for illuminating and determining skin in image recognition system. The purpose of this paper is to determine and design the proposed scheme to solve illumination variation an...

Research paper thumbnail of Identifying Benefits and risks associated with utilizing cloud computing

Cloud computing is an emerging computing model where IT and computing operations are delivered as... more Cloud computing is an emerging computing model where IT and computing operations are delivered as services in highly scalable and cost effective manner. Recently, embarking this new model in business has become popular. Companies in diverse sectors intend to leverage cloud computing architecture, platforms and applications in order to gain higher competitive advantages. Likewise other models, cloud computing brought advantages to attract business but meanwhile fostering cloud has led to some risks, which can cause major impacts if business does not plan for mitigation. This paper surveys the advantages of cloud computing and in contrast the risks associated using them. Finally we conclude that a well-defined risk management program that focused on cloud computing is an essential part of gaining value from benefits of cloud computing.

Research paper thumbnail of The Application of Fusion of Heterogeneous Meta Classifiers to Enhance Protein Fold Prediction Accuracy

Lecture Notes in Computer Science, 2011

Protein fold prediction problem is considered as one of the most challenging tasks for molecular ... more Protein fold prediction problem is considered as one of the most challenging tasks for molecular biology and one of the biggest unsolved problems for science. Recently, varieties of classification approaches have been proposed to solve this problem. In this study, a fusion of heterogeneous Meta classifiers namely: LogitBoost, Random Forest, and Rotation Forest is proposed to solve this problem. The proposed approach aims at enhancing the protein fold prediction accuracy by enforcing diversity among its individual members by ...

Research paper thumbnail of Implementation and Evaluation of Lightweight Encryption Algorithms Suitable for RFID

Journal of Next Generation Information Technology, 2013

ABSTRACT Export Date: 16 April 2013, Source: Scopus

Research paper thumbnail of Taxonomy of Filtering Based Illumination Normalization for Face Recognition

Journal of Telecommunication, Electronic and Computer Engineering, 2017

Presently, the difficulty in managing illumination over the face recognition techniques and smoot... more Presently, the difficulty in managing illumination over the face recognition techniques and smooth filters has emerged as one of the biggest challenges. This is due to differences between face images created by illuminations which are always bigger than the inter-person that usually be used for identities’ recognition. No doubt, the use of illumination technique for face recognition is much more popular with a greater number of users in various applications in these days. It is able to make applications that come with face recognition as a non-intrusive biometric feature becoming executable and utilizable. There are tremendous efforts put in developing the illumination and face recognition by which numerous methods had already been introduced. However, further considerations are required such as the deficiencies in comprehending the sub-spaces in illuminations pictures, intractability in face modelling as well as the tedious mechanisms of face surface reflections as far as face reco...

Research paper thumbnail of SIKM – a smart cryptographic key management framework

Open Computer Science, 2022

For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using ... more For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management. Many key management schemes are devised that each one is suitable for a specific range of applications. However, these schemes have some common drawbacks like the hardness of key generation and distribution, key storage, attacks, and traffic load. In this article, a key management framework is proposed, which is attack resistant and transforms the current customary key management workflow to enhance security and reduce weaknesses. The main features of the proposed framework are eliminating key storage, smart attack resistant feature, reducing multiple-times key distribution to just one-time interpreter distribution, and having short key intervals – minutely, hourly, and daily. Moreover, the key revocation process happens automatically and with no ...

Research paper thumbnail of Adult content image recognition by Boltzmann machine limited and deep learning

Evolutionary Intelligence

Adult content images have a detrimental effect on Internet users, a significant number of whom ar... more Adult content images have a detrimental effect on Internet users, a significant number of whom are minors. Therefore, it is essential to control and detecting adult content images using multimedia processing and computer vision techniques. Previous studies have typically focused on manual-engineered visual features that may be difficult to detect and analyze. This paper presents a new model that employs deep convolutional neural networks within a Gaussian-Bernoulli limited-time, for adult content image recognition of a wide variety in a precise and effective manner. There are various layers within Convolutional Neural Networks for feature extraction and classification. Gaussian-Bernoulli limited-time was used for feature extraction to describe the images, and these features were summarized using the Boltzmann machine limited in the feature summary phase. The benefit of such an approach is convenience in carrying out feature extraction. Additionally, when tested on the most modern cr...

Research paper thumbnail of Information Security Awareness Behavior : A Conceptual Model for Cloud

INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY

Cloud computing has changed the whole picture that distributed computing used to present such as ... more Cloud computing has changed the whole picture that distributed computing used to present such as Grid computing, server client computing. Despite Cloud offers great benefits, it also introduces a myriad of security threats to the information and data which is now being ported from on-premises to off-premises. These security threats must be overcome in order to get full benefit from this new computing exemplar. This paper identifies the importance of awareness behaviour in context of information security for cloud. We investigate four important factors of security awareness behaviour that should be considered when organisations intend to improve their security toward cloud computing environment based on awareness-focused programs. Finally we conclude that a well-structured awareness program that positively affect the level of self-efficacy, security practice care behaviour, security awareness technology behaviour and intention will improve the level of total information security in ...

Research paper thumbnail of Face Recognition via Taxonomy of Illumination Normalization

Intelligent Systems Reference Library, 2016

Research paper thumbnail of An overview of objectionable image detection

2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), 2015

Research paper thumbnail of A Review on Techniques of Illumination in Face Recognition

International Journal of Engineering & Technology Sciences

Face recognition under varying illumination is one of the challenging problems in real-time appli... more Face recognition under varying illumination is one of the challenging problems in real-time applications. Numerous methods have been developed by the research community to handle the problem. Existing surveys of methods are either too old or do not cover performance analysis of illumination invariant methods. This review summarizes the concepts related to the main challenge experienced by the present face recognition techniques and smooth filters are the difficulty in managing illumination. The differences in face images that are created by illumination are normally bigger compared to the differences in inter-person that is utilized to differentiate identities. However, face recognition over illumination has more uses in a lot of applications that deal with subjects that are not cooperative where the highest potential of the face recognition as a non-intrusive biometric feature can be executed and utilized. On the other hand, there are some anxieties with face recognition and illumi...

Research paper thumbnail of Filtering Based Illumination Normalization Techniques for Face Recognition

TELKOMNIKA Indonesian Journal of Electrical Engineering, 2015

The main challenge experienced by the present face recognition techniques and smooth filters are ... more The main challenge experienced by the present face recognition techniques and smooth filters are the difficulty in managing illumination. The differences in face images that are created by illumination are normally bigger compared to the differences in inter-person that is utilized to differentiate identities. However, face recognition over illumination has more uses in a lot of applications that deal with subjects that are not cooperative where the highest potential of the face recognition as a non-intrusive biometric feature can be executed and utilized. A lot of work has been put into the research and development of illumination and face recognition in the present era and a lot of critical methods have been introduced. Nevertheless, there are some concerns with face recognition and illumination that require further considerations which include the deficiencies in comprehending the sub-spaces in illumination pictures, problems with intractability in face modelling and complicated mechanisms of face surface reflections.

Research paper thumbnail of Information Security Awareness Behaviour: A Conceptual Model for Cloud

Cloud computing has changed the whole picture that distributed computing used to present such as ... more Cloud computing has changed the whole picture that distributed computing used to present such as Grid computing, server client computing. Despite Cloud offers great benefits, it also introduces a myriad of security threats to the information and data which is now being ported from on-premises to off-premises. These security threats must be overcome in order to get full benefit from this new computing exemplar. This paper identifies the importance of awareness behaviour in context of information security for cloud. We investigate four important factors of security awareness behaviour that should be considered when organisations intend to improve their security toward cloud computing environment based on awareness-focused programs. Finally we conclude that a well-structured awareness program that positively affect the level of self-efficacy, security practice care behaviour, security awareness technology behaviour and intention will improve the level of total information security in c...

Research paper thumbnail of Face Recognition by Implying Illumination Techniques – A Review Paper

ABSTRACT The purpose of this review paper is to present the technical basis for establishing the ... more ABSTRACT The purpose of this review paper is to present the technical basis for establishing the quality criteria by using the face recognition techniques and smooth filters. The metamorphoses in face images are formed by illumination, in general they show the better quality compared with the metamorphoses in inter-person by differentiating the identities. Conversely, face recognition over illumination possesses several applications in dealing with a non intrusive biometric feature. Several attempts have been done regarding to the research, nevertheless, some of them are including the deficiencies in comprehending the subspaces in illumination pictures, challenging with intractability in face modelling and complicated mechanisms of face surface reflections. This study aims to offer a crucial review of illumination techniques, and image-based on illumination variation in face recognition.