Personal Information
Organization / Workplace
Iraq Iraq
Occupation
Student
Industry
Technology / Software / Internet
Contact Details
Tags
computer
masters
computer science
seminar
security
biometrics
recognition
pattern recognition
multimedia
video
computer architecture
block cipher
image
pentium architecture
pentium
rtl
register transfer languages
multi core
multi core processor
des
block cipher operation
advanced encryption standard
aes
pseudorandom
pseudorandom number generation
prng
public key
public key cryptography
rsa
diffie hellman
elgamal
control unit
hardwired control
microprogramed control
instruction formats
pentium instruction format
type of address instruction
instruction set architecture isa
immediate
direct
indirect
register
register indirect
displacement
stack
cache memory
memory system
virtual memory
page replacement algorithms
input output organization
input output
multi processor
pipelining
lossless compression
video compression
compression
image compression standards
graphics
voice
palm print
palm
on line signature
signature
multi biometrics
iris
vascular
hand vascular
hand
hand geometry
forensic dental
dental
forensic
fingerprints
fingerprint
facial
ear
3d face
hazards
elliptic curve
hash
hash functions
network security
digital signatures
key management
key
key management and distribution
email
email security
cryptanalysis
cryptanalysis method
steganography
watermarking
wireless
mobile
networks
network
communications
content based retrieval
lossy
lossy compression
lossless
See more
- Presentations
- Documents
- Infographics