Found: 17 resources
Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network
Engineering and Technology Journal, 2010, Volume 28, Issue 12, Pages 2337-2352
Watermarking for Relational Database by using Threshold Generator
Engineering and Technology Journal, 2011, Volume 29, Issue 1, Pages 33-43
Remove Reflection Using Wavelet transformation Estimation
Iraqi Journal of Science, 2018, Volume 59, Issue 1C, Pages 629-634
Reflections Removal Using K-Means Clustering
Al-Nahrain Journal of Science, 2018, Volume 21, Issue 3, Pages 162-168
Text File Hiding Randomly Using Secret Sharing Scheme
Engineering and Technology Journal, 2018, Volume 36, Issue 1 Part (B) Scientific, Pages 1-6
Remove Reflections using Bisquare Iterative Reweighted Least Square
Iraqi Journal of Science, 2019, Volume 60, Issue 4, Pages 868-874
Comparative Analysis of GMM, KNN, and ViBe Background Subtraction Algorithms Applied in Dynamic Background Scenes of Video Surveillance System
Engineering and Technology Journal, 2022, Volume 40, Issue 4 [Science], Pages 617-626
New Approach of Generating Ground-Truth for Local Surveillance Dataset Tested with Benchmark Background Subtraction Models
Iraqi Journal of Science, 2023, Volume 64, Issue 4, Pages 2037-2050
Single Image Reflection Removal
Academic Science Journal, 2019, Volume 15, Issue 03, Pages 39-53
Developed Method of Information Hiding in Video AVI File Based on Hybrid Encryption and Steganography
Engineering and Technology Journal, 2011, Volume 29, Issue 2, Pages 359-373