Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-2 of 2 total results
Different Obfuscation Techniques for Code Protection ...
Procedia Computer Science 70 ( 2015 ) 757 – 763 Available online at www.sciencedirect.com 1877-0509 © 2015 The Authors. Published by Elsevier B.V.
DE-CNN: An Improved Identity Recognition Algorithm Based ...
A. E. Vacarus, “Biometric security-fingerprint recognition system,” Journal of Mobile, Embedded and Distributed Systems, vol. 7, pp. 17–23, 2015. View at: Google Scholar C. Huang and G. Tian, “A new pulse coupled neural network (pcnn) for brain medical image fusion empowered by shuffled frog leaping algorithm,” Frontiers in ...