To search, Click below search items.
All Published Papers Search Service
Title
An Efficient Off-line Signature Identification Method Based On Fourier Descriptor and Chain Codes
Author
Ismail A. Ismail, Mohamed A. Ramadan, Talaat S. El-Danaf, Ahmed H. Samak
Vol. 10 No. 5 pp. 29-35
Keywords
signature recognition, Fourier Descriptor, Principle Component Analysis, personal verification
An Overview of Alagappa University Delay Tolerant Water Monitoring Network
Laveen Sundararaj, Palanisamy Vellaiyan
Vol. 10 No. 5 pp. 19-28
DTN - Delay and Disruption Tolerant Networking, IPN ? Inter Planetary Internet, AUDTWMN- Alagappa University Delay Tolerant Water Monitoring Network, Alunivdtnsim ? Alagappa University Delay Tolerant Network Simulator, LTP ? Lick Lider Transmission Protoc
Security Analysis of Access Linux Platform
Andreas Sj?str?m, Kazuhide Fukushima, Shinsaku Kiyomoto, Wook Shin, Toshiaki Tanaka
Vol. 10 No. 5 pp. 12-18
Access Linux, Security, Open Platform, Mobile, Vulnerability
Genetic Algorithm for DES Cryptanalysis
Tarek Tadros, Abd El Fatah Hegazy, Amr Badr
Vol. 10 No. 5 pp. 5-11
DES, Differential Cryptanalysis, Linear Cryptanalysis, Genetic Algorithm, Evolutionary Cryptanalysis