Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where P. W. C. Prasad is active.

Publication


Featured researches published by P. W. C. Prasad.


International Journal of Pattern Recognition and Artificial Intelligence | 2017

Improving Accuracy in Face Recognition Proposal to Create a Hybrid Photo Indexing Algorithm, Consisting of Principal Component Analysis and a Triangular Algorithm (PCAaTA)

L. G. Vu; Abeer Alsadoon; P. W. C. Prasad; A. M. S. Rahma

Accurate face recognition is today vital, principally for reasons of security. Current methods employ algorithms that index (classify) important features of human faces. There are many current studies in this field but most current solutions have significant limitations. Principal Component Analysis (PCA) is one of the best facial recognition algorithms. However, there are some noises that could affect the accuracy of this algorithm. The PCA works well with the support of preprocessing steps such as illumination reduction, background removal and color conversion. Some current solutions have shown results when using a combination of PCA and preprocessing steps. This paper proposes a hybrid solution in face recognition using PCA as the main algorithm with the support of a triangular algorithm in face normalization in order to enhance indexing accuracy. To evaluate the accuracy of the proposed hybrid indexing algorithm, the PCAaTA is tested and the results are compared with current solutions.


Computer Applications in Engineering Education | 2016

Using simulators for teaching computer organization and architecture

P. W. C. Prasad; Abeer Alsadoon; Azam Beg; Anthony Chan

An important problem in teaching the subjects of Computer Architecture and Organization (CO&CA) is the linking of the theoretical knowledge with the practical experience. Visualization of different computer hardware architectures with the use of the simulators enhances the learning process among students. Many useful computer simulators can help address this issue by covering various aspects of CO&CA. The programs range from simple simulators to specific teaching tools to advanced and specialized software. We assessed several simulators and selected one that was freely available and that enabled the students to learn the concepts to the fullest. This paper describes our experience of incorporating simulation tools into teaching the CO&CA to information technology and computing students. We demonstrate that the use of simulators helped students understand better how a computer was constructed and how it functioned internally.


Science and Engineering Ethics | 2018

Ethical Implications of User Perceptions of Wearable Devices

L. H. Segura Anaya; Abeer Alsadoon; Nectar Costadopoulos; P. W. C. Prasad

Health Wearable Devices enhance the quality of life, promote positive lifestyle changes and save time and money in medical appointments. However, Wearable Devices store large amounts of personal information that is accessed by third parties without user consent. This creates ethical issues regarding privacy, security and informed consent. This paper aims to demonstrate users’ ethical perceptions of the use of Wearable Devices in the health sector. The impact of ethics is determined by an online survey which was conducted from patients and users with random female and male division. Results from this survey demonstrate that Wearable Device users are highly concerned regarding privacy issues and consider informed consent as “very important” when sharing information with third parties. However, users do not appear to relate privacy issues with informed consent. Additionally, users expressed the need for having shorter privacy policies that are easier to read, a more understandable informed consent form that involves regulatory authorities and there should be legal consequences the violation or misuse of health information provided to Wearable Devices. The survey results present an ethical framework that will enhance the ethical development of Wearable Technology.


international conference on digital information processing and communications | 2016

Enhanced e-health framework for security and privacy in healthcare system

N. M. Shrestha; Abeer Alsadoon; P. W. C. Prasad; L. Hourany; A. Elchouemi

Patient health record (PHR) is a rising patient centric model which is frequently outsourced to store at third party. This addresses the issue in privacy such as hiding the sensitive health data of a patient which can be assessed by unauthorized users. In this paper, a new secured e-health framework has proposed. In this framework, patient centric personal data and access control scheme with enhanced encryption method has been considered. Security and privacy of personal health information have been identified by digital signature and patient pseudo identity as well as. This paper address the enhanced security model for more authentication and authorization functionality and expects to discover the new technique that can be utilized to build the efficiency in e-health care system based on security, privacy and user satisfaction. The survey has been conducted to test the proposed e-health framework. The data has been analyzed using SPSS tool.


southwest symposium on image analysis and interpretation | 2016

Incorporating skin color for improved face detection and tracking system

B. Dahal; Abeer Alsadoon; P. W. C. Prasad; A. Elchouemi

Face detection and tracking have wide applications, for example, law enforcement, gaming, image search, marketing, etc. The detection and tracking tasks are quite challenging. Tracking the face in an image includes gender identification and segmenting the face using the skin color. In the past, many methods have been proposed to identify a face in videos, such as feature-based detection, skin color segmentation, appearance, and eigen-based identification. These techniques use image classifiers (both weak and strong) but are not very accurate. This paper introduces a hybrid method that utilizes skin color for increasing accuracy of detection and tracking. In our method, an image is rescaled and divided based on skin color, using RGB (red-green-blue) color combinations. The divided skin tone image is combined with the edges of images before applying the morphological operations. As a final step, a bounding box appears on the detected face.


mobile cloud computing & services | 2017

Hybrid Secure and Scalable Electronic Health Record Sharing in Hybrid Cloud

R. Manoj; Abeer Alsadoon; P. W. C. Prasad; Nectar Costadopoulos; Salih Ali

Cloud computing has become an integral part of theoperation of health. However, there are major security andprivacy issues in terms of accessing medical records from thehybrid cloud environment. In this paper, a new secure hybridElectronic Health Record system is proposed. In this framework, two efficient encryption methods are combined for fine grainedaccess control and protection of data privacy. Multi-authority andKey-based encryption schemes are used for the encryption of eachpart of health records after dividing those records using a verticalpartitioning method. Multi-authority encryption schemes areprimarily used in the Public Domains (PUDs), while Key-basedencryption schemes are prevalent in Personal Domains (PSDs). Together, they provide, secure data access and authentication ofusers. Implementation is facilitated using Windows Azure CloudComputing platform.


mobile cloud computing & services | 2016

Cloud Computing Potability with Risk Assessment

A. Chopra; P. W. C. Prasad; Abeer Alsadoon; Samaher Hussein Ali; A. Elchouemi

The purpose of this study is to identify the risks associated with job migration from private to public cloud. Meeting the resource requirements of a particular task in the private environment causes only minimal exposure of the core applications to public cloud. The potential risk issues to the private data and applications can thus be minimized. However, risks are significantly higher when core applications are migrated to public cloud. This places high importance on accurate identification of risk factor in job migration is extremely important. This report proposes to identify categories of risk arising from internal and external environment. This will require use of mitigating strategies to eliminate risk factors associated with the phases of a job migration. Such migration is achieved by taking in to account the roles of the dedicated users and set of common constraints. The findings from this research results indicate that safe job migration can be achieved with effective risk management and mitigation techniques.


international workshop on combinatorial image analysis | 2015

SIFT based approach on Bangla sign language recognition

Farhad Yasir; P. W. C. Prasad; Abeer Alsadoon; A. Elchouemi

This paper presents a SIFT-based geometrically computational approach to vigorously recognize Bangla sign language (BdSL). Gaussian distribution and grayscaling techniques are applied for image processing and normalizing the sign image. After this pre-processing, features are extracted from the sign image by implementing scale invariant feature transform. Acquiring all descriptors from the sign image, k-means clustering is executed on all the descriptors which are previously computed by SIFT. Based on the sample training set, each of the cluster denotes as a visual word. Considering the histograms of the clustering descriptors, Bag of words model is introduced on this hybrid approach which develops a set of visual vocabulary. Finally for each of sign word, a binary linear support vector machine (SVM) classifier is trained with a respective training data set. Considering these binary classifiers, we obtained a respective recognition rate on both Bangla signs of expressions and alphabets.


2014 2nd International Conference on Emerging Technology Trends in Electronics, Communication and Networking | 2014

Cyber schooling: A revolution for the education system

P. Smith; P. W. C. Prasad; Ashutosh Kumar Singh

Cyber Schools and MOOCs are a recent development in online education for unlimited free access and participation through the cloud. They are relevant for researchers and software professionals, not only because they will increasingly receive lifelong education through Cloud-ready platform and related technologies, but also the delivery through the cloud which evolves into a new form of development of social and cognitively integrated software. This paper discusses the ways in which education is reinforced by Cyber schools and MOOCs and other digital technologies for learning, in particular differentiating between the free educational content provided by MOOCs and the emerging collaborative processes. Cyber schools and MOOCs and their evolution as a subject for research in the learning sciences are explored.


2017 8th International Conference on Information and Communication Systems (ICICS) | 2017

Early diagnosis of breast cancer using contrast limited adaptive histogram equalization (CLAHE) and Morphology methods

Nabin Kharel; Abeer Alsadoon; P. W. C. Prasad; A. Elchouemi

The main aim of this paper is to enhance using hybrid solution for early diagnosis of breast cancer using mammogram images. For the CAD system for any image processing system follows mainly four steps that is image pre processing, segmentation, features extraction and classification and evaluation. For this research purpose follows the same structure using best possible methods in each stage found in literature review and proposed solution. From the experiment hybrid image enhancement method using CLAHE and Morphology method helps to enhance image for further computation in CAD system to early diagnosis of breast cancer using mammogram images while maintaining processing time as previous best solution. From the study depict that the purposed solution can help to enhance mammogram images for the further processing for segmentation, feature extraction and classification. However, further testing and implementation of proper classification method needed for before clinical use.

Collaboration


Dive into the P. W. C. Prasad's collaboration.

Top Co-Authors

Avatar

Abeer Alsadoon

Charles Sturt University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

L. Pham

Charles Sturt University

View shared research outputs
Top Co-Authors

Avatar

Angelika Maag

Charles Sturt University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Azam Beg

United Arab Emirates University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge