Copyright ©2024 SAUC
Biometric voice authentication auto-evaluation system
Human voice extracted biometric features: What can be used for
Survey of biometrie based key generation to enhance security of cryptosystems
Ant-based sorting and ACO-based clustering approaches: A review
Modified ACS Centroid Memory for Data Clustering
Balancing exploration and exploitation in ACS algorithms for data clustering
Autonomous navigation of mobile robot based on flood fill algorithm
Design and Develop an Information system for Court Data in the Republic of Iraq by using SSRS Reports with SSAS Cubes
Improved Self-Adaptive ACS Algorithm to Determine the Optimal Number of Clusters
Hybrid Black Widow Optimization and Variable Neighborhood Descent Algorithm for Traveling Salesman Problem
Grey wolf optimization algorithm for hierarchical document clustering
A DNA-sticker algorithm for cryptanalysis LFSRs and NLFSRs based stream cipher
Hybrid method to Implement a Parallel search of the cryptosystem keys
DB based DNA computer to Attack stream cipher
An Empirical Study on Predicting Employees’ Acceptance of E-Banking in Iraq
Harnessing Computer Vision Technology to Provide Useful Service to University Students
Cryptanalysis of OTP Cipher Using Probabilistic Splicing DNA Computer