Found: 8 resources
Listing 1 - 8 of 8
Sort by
Design and Implement of Key Management System for Public Key Algorithms
Al-Rafidain University College For Sciences, 2011, Volume , Issue 27, Pages 19-34
Kernel Level Anti-Spyware Using Device Stack Lock Strategy
Engineering and Technology Journal, 2012, Volume 30, Issue 9, Pages 1582-1592
Website Anti-Phishing Technique Using Randomized Dyadic Dilation DWT
Engineering and Technology Journal, 2011, Volume 29, Issue 14, Pages 2859-2868
Semi – Chaotic Mutual Learning Platform for Key – Exchange Algorithm Using Neural Network
Engineering and Technology Journal, 2012, Volume 30, Issue 11, Pages 1971-1979
Ontology Based Image Analysis in Autonomous Computer Environment
Engineering and Technology Journal, 2013, Volume 31, Issue 4 Part (B) Scientific, Pages 419-430
Paper Currency Detection based Image Processing Techniques: A review paper
Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 1-8 Comp
A Comparison between Multiple Features Extraction Method for Iraq Currency Image
Iraqi Journal of Information Technology, 2019, Volume 9, Issue 4, Pages 108-119
Multiple Segmentation Methods for Iraqi Paper Currency (IPC)
AL-yarmouk Journall, 2019, Volume 11 th year, Issue 1, Pages 159-170
Listing 1 - 8 of 8
Sort by