All Stories

  1. Using Performance Counters in Malware Detection: Data Analysis and Anomaly
  2. Improving the accuracy of camera model identification through Jaya algorithm optimization
  3. An appraisal of Ransomware detection enhancement through GALA-based techniques
  4. Machine Learning Approaches to Ransomware Detection: A Comprehensive Review
  5. Signature verification based on proposed fast hyper deep neural network
  6. Offline Handwritten Signature Identification based on Hybrid Features and Proposed Deep Model
  7. Offline Handwritten Signature Identification based on Hybrid Features and Proposed Deep Model
  8. A Comparative Study among Handwritten Signature Verification Methods Using Machine Learning Techniques
  9. A fuzzy vault development based on iris images
  10. Iris Features Extraction and Recognition based on the Local Binary Pattern Technique
  11. Second-Order Statistical Methods GLCM for Authentication Systems
  12. Distributed Transform Encoder to Improve Diffie-Hellman Protocol for Big Message Security
  13. A Raspberry PI Real-Time Identification System on Face Recognition
  14. Eye Diseases Classification Using Hierarchical MultiLabel Artificial Neural Network
  15. Effect of levels in Dual Tree Complex Wavelet Transform when design Universal image stego-analytic
  16. Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
  17. Eye Detection using Helmholtz Principle
  18. Comparison between the effects of Aloe vera and chlorhexidine on clinical periodontal parameters
  19. Anti-screenshot Keyboard for Web-Based Application Using Cloaking
  20. Automatic Book Scanner
  21. Effect of Successive Convolution Layers to Detect Gender
  22. Pupil detection algorithm based on feature extraction for eye gaze
  23. Multi-spectral Face Recognition System
  24. Designing a smartphone honeypot system using performance counters
  25. Fuzzy gradient based image reconstruction as a means for detection the tampering