An effective computational technique for taxonomic position of security vulnerability in software development

AK Srivastava, S Kumar - Journal of Computational Science, 2018 - Elsevier
An increasing demand of security standards in open networks and distributed computing
environment has become a critical issue for automation of the business process workflow. At …

A connectionist computational method for face recognition

FA Pujol, H Mora, JA Girona-Selva - International Journal of Applied …, 2016 - sciendo.com
In this work, a modified version of the elastic bunch graph matching (EBGM) algorithm for
face recognition is introduced. First, faces are detected by using a fuzzy skin detector based …