Found: 11 resources


Narrow your search

Resource type

article (11)


Language

English (11)


Year
From To Submit

2019 (1)

2018 (3)

2017 (2)

2014 (1)

2013 (1)

More...
Listing 1 - 10 of 11
<<
Page
of 2
Sort by

Proposed Method to Enhance the Security of Blowfish Algorithm

Engineering and Technology Journal, 2011, Volume 29, Issue 13, Pages 2648-2661

Proposed Digital Signature Using One Time Pad

Engineering and Technology Journal, 2013, Volume 31, Issue 2 Part (B) Scientific, Pages 261-275

HMAC Modification Using New Random Key Generator

IRAQI JOURNAL OF COMPUTERS, COMMUNICATION, CONTROL & SYSTEMS ENGINEERING, 2014, Volume 14, Issue 1, Pages 72-82

Three-dimensional Face Reconstruction using 3D Morphable Model Fitting Method

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages Comp Page 25-37
 

Methods of Secure Routing Protocol in Wireless Sensor Networks

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 3, Pages Comp Page 38-55

3D Face Reconstruction Methods for Unconstrained Images: A Survey

Journal Of AL-Turath University College, 2017, Volume , Issue 23, Pages 103-116
 

An Effective Wireless Monitoring Tool (EWMT)

Engineering and Technology Journal, 2010, Volume 28, Issue 16, Pages 5223-5237
 

Surface Shape Descriptors on 3D Faces

Iraqi Journal of Science, 2017, Volume 58, Issue 3C, Pages 1740-1750

Paper Currency Detection based Image Processing Techniques: A review paper

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 1, Pages 1-8 Comp

3D Face Reconstruction Using Structure from Motion Technique

Iraqi Journal of Information Technology, 2019, Volume 9, Issue 3 اللغة الانكليزية, Pages 50-69

Listing 1 - 10 of 11
<<
Page
of 2
Sort by