Development and Evaluation of a Fuzzy Inference Engine System to Incorporate Quality of Service
|
Written by M. Saraireh |
Hits: 2393
|
Crypto Key Generation using Contour Graph Algorithm
|
Written by M.S. Al-Tarawneh, L.C.Khor, W.L.Woo and S.S Dlay |
Hits: 2334
|
Crypto Key Generation using Slicing Window Algorithm
|
Written by M.S. ALTARAWNEH, L.C.KHOR, W.L.WOO and S.S DLAY |
Hits: 2816
|
OBJECTIVE FINGERPRINT IMAGE QUALITY ASSESSMENT USING GABOR SPECTRUM APPROACH
|
Written by M. S. ALTARAWNEH, W.L.WOO, and S.S DLAY, |
Hits: 2510
|
A Hybrid Method for Fingerprint Image Validity and Quality Computation
|
Written by M.S. ALTARAWNEH, W.L. WOO, and S.S. DLAY |
Hits: 2194
|
Biometric Key Capsulation Technique Based on Fingerprint Vault: Analysis and attack
|
Written by M.S. ALTARAWNEH, W.L. WOO, and S.S. DLAY |
Hits: 2986
|
Fuzzy Vault Crypto Biometric Key Based on Fingerprint Vector Features
|
Written by M.S. ALTARAWNEH, W.L. WOO, and S.S. DLAY |
Hits: 2573
|
A NON Reference Fingerprint Image Validity via Statistical Weight Calculation
|
Written by M. S. Al-Tarawneh, L. C. Khor, W. L. Woo, and S. S. Dlay |
Hits: 3860
|
Efficient fingerprint feature extraction: Algorithm and performance evaluation
|
Written by Palmer, L.R. Al-Tarawneh, M.S. Dlay, S.S. Woo, W.L. |
Hits: 3097
|
Assessment and improvement of quality of service in wireless networks using fuzzy and hybrid genetic
|
Written by Mohammad Saraireh, R. Saatchi, S. Al-khayatt and R. Strachan |
Hits: 1827
|