53 results on '"Akkad A"'
Search Results
2. Securing Visual Data: A Fresh Approach with Arnold Cat Map and Chebyshev Map Encryption
3. Enhancing Data Security Through Hybrid Cryptographic Techniques: XOR and RSA Integration for RGB Image Encryption
4. Artificial Neural Network for Extraction and Analysis of Consumer Opinions in Tourism
5. Hybrid Cryptography Based on Constellations: Sagittarius
6. Securing RGB Image Using an Algorithm Based on the Pickover 3D Attractors System and Rearrangement by Block
7. Precision Farming Based on Artificial Intelligence Algorithms: Monitoring of Agricultural Fields Based on the Description and Analysis of Data Obtained by Several Sensors
8. Hybrid Cryptography Based on Constellations: Cassiopeia
9. Securing Caesar Cryptography Using the 2D Geometry
10. Medical Image Segmentation Using Deep Learning: A Survey
11. Random Forest for Semantic Segmentation Using Pre Trained CNN (VGG16) Features
12. CCC-Transformation: Novel Method to Secure Passwords Based on Hash Transformation
13. A Review of Video Summarization
14. Vehicle Routing for Municipal Waste Collection Systems: Analysis, Comparison and Application of Heuristic Methods
15. GpLMS: Generalized Parallel Least Mean Square Algorithm for Partial Observations
16. An RGB Image Encryption Algorithm Based on Clifford Attractors with a Bilinear Transformation
17. Homomorphic Method Additive Using Pailler and Multiplicative Based on RSA in Integers Numbers
18. Moroccan Carpets Classification Based on SVM Classifier and ORB Features
19. Ensure the Confidentiality of Documents Shared Within the Enterprise in the Cloud by Using a Cryptographic Delivery Method
20. A Self Referencing Technique for the RC-pLMS Adaptive Beamformer and Its Hardware Implementation
21. Image Segmentation Approach Based on Hybridization Between K-Means and Mask R-CNN
22. A Powerful and Efficient Method of Image Segmentation Based on Random Forest Algorithm
23. A Novel Brain Tumor Detection Approach Based on Fuzzy C-means and Marker Watershed Algorithm
24. Securing the Storage of Passwords Based on the MD5 HASH Transformation
25. Applying Sustainable Logistics in Industry 4.0 Era
26. Hardware Architecture for a Bit-Serial Odd-Even Transposition Sort Network with On-The-Fly Compare and Swap
27. A New Color Image Encryption Algorithm Using Random Number Generation and Linear Functions
28. A New Encryption Approach Based on Four-Square and Zigzag Encryption (C4CZ)
29. Silhouettes Based-3D Object Reconstruction Using Hybrid Sparse 3D Reconstruction and Volumetric Methods
30. Image Segmentation Based on K-means and Genetic Algorithms
31. An Efficient Non-Blind Steering Vector Estimation Technique For Robust Adaptive Beamforming With Multistage Error Feedback
32. Twiddle Factor Generation Using Chebyshev Polynomials and HDL for Frequency Domain Beamforming
33. Reconstruction of the 3D Scenes from the Matching Between Image Pair Taken by an Uncalibrated Camera
34. A Novel Text Encryption Algorithm Based on the Two-Square Cipher and Caesar Cipher
35. Hernia Surgery in Africa
36. Conclusions
37. Empirical Findings
38. Methodology
39. Second System: Local Cloud
40. State of the Art
41. First System: Help Beacons
42. Conceptual Framework
43. Background
44. Introduction
45. Credit Where Credit Is Due: Respecting Authorship and Intellectual Property
46. American War
47. An Energy-Saving Support System for Office Environments
48. Photovoltaik-Supply Chain Design: Zukünftige Wertschöpfungsketten in der Solarbranche
49. Pharmacological targets to inhibit alzheimer neurofibrillary degeneration
50. Viszeralchirurgie
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.