Web
Education
Viewing 1-2 of 2 total results
Different Obfuscation Techniques for Code Protection ...
Procedia Computer Science 70 ( 2015 ) 757 – 763 Available online at www.sciencedirect.com 1877-0509 © 2015 The Authors. Published by Elsevier B.V.
DE-CNN: An Improved Identity Recognition Algorithm Based ...
A. E. Vacarus, “Biometric security-fingerprint recognition system,” Journal of Mobile, Embedded and Distributed Systems, vol. 7, pp. 17–23, 2015. View at: Google Scholar C. Huang and G. Tian, “A new pulse coupled neural network (pcnn) for brain medical image fusion empowered by shuffled frog leaping algorithm,” Frontiers in ...
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.