Buscas alternativas:
authentication algorithm » segmentation algorithm (Expandir a busca)
optimization algorithm » optimization algorithms (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
using code » using cone (Expandir a busca), using model (Expandir a busca), using cold (Expandir a busca)
authentication algorithm » segmentation algorithm (Expandir a busca)
optimization algorithm » optimization algorithms (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
using code » using cone (Expandir a busca), using model (Expandir a busca), using cold (Expandir a busca)
1
“...-correcting code whose message is formed from a binary chaotic sequence and from bits of the original image...”
New fragile image watermarking schemes using chaotic sequences
Dissertação
2
Assuntos:
“...Dagman method...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese
3
Assuntos:
“...Dagman method...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese
4
“... of an application of the Genetic Algorithm method (GA) in the parameters optimization in the LEED analysis. As this...”
Busca global em LEED usando algorítmo genético
Dissertação