S. M. Abdullah

  • Citations Per Year
Learn More
In modern life, interactions between human beings frequently occur in meetings, where topics are discussed. Semantic knowledge of meetings can be revealed by discovering interaction patterns from these meetings. An existing method mines interaction patterns from meetings using tree structures. However, such a tree-based method may not capture all kinds of(More)
In this paper, we propose a new algorithm to compute the strength of passwords based on two measurements, mainly: password entropy and password quality. The passwords considered by the algorithm consist of eight characters alpha numeric with special characters. For such passwords, the analysis phase identified the low/high entropy patterns and low/high(More)
This paper presents a new LiDAR segmentation technique for automatic extraction of building roofs. First, it uses a height threshold, based on the digital elevation model to divide the LiDAR point cloud into ‘ground’ and ‘non-ground’ points. Then starting from the maximum LiDAR height, and decreasing the height at each iteration, it looks for coplanar(More)
This paper presents a new LiDAR segmentation technique for automatic building detection and roof plane extraction. First, it uses a height threshold, based on the digital elevation model it divides the LiDAR point cloud into “ground” and “non-ground” points. Then, starting from the maximum LiDAR height, and decreasing the height(More)
— Image Recognition is one of the computer vision applications in recent years. Commercially, security and law applications require the use of face recognition technology. Human face can be regarded as the most obvious human identifier. Apparently the face is the most visible part of human anatomy and serves as the first distinguishing factor of a human(More)
This paper presents a hierarchical image segmentation algorithm based on the principle of mutual nearest neighbours. Image segmentation remains a great challenge in the computer vision community. To solve this problem, various algorithms have been proposed in the literature. However, most of these algorithms depend heavily on thresholds or parameter(More)
  • 1