Enviar pesquisa
Carregar
Avoir de l'estomac
•
Transferir como PPS, PDF
•
0 gostou
•
310 visualizações
Sylvain Dufour
Seguir
Estilo de vida
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 15
Baixar agora
Recomendados
Anamorphose
Anamorphose
Sylvain Dufour
Airbus
Airbus
Sylvain Dufour
Telephone [fr]
Telephone [fr]
Enomao
Présentation de Christion Roy du Groupe Promutuel lors de l'Agile Tour 2009 Québec.
L'agilité dans le monde de l'assurance: l'expérience vécue d'un virage comple...
L'agilité dans le monde de l'assurance: l'expérience vécue d'un virage comple...
Agile Tour 2009 Québec
B0460612
B0460612
IOSR Journals
Abstract: Network security and Intrusion Detection Systems (IDS’s) is an important security related research area. This paper applies K-star algorithm with filtering analysis in order to build a network intrusion detection system. For our experimental analysis and as a case study, we have used the new NSL-KDD dataset, which is a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 66.0% for the training set and the remainder for the testing set a 2 class classifications has been implemented. WEKA which is a java based open source software consists of a collection of machine learning algorithms for Data mining tasks has been used in the testing process. The experimental results show that the proposed approach is very accurate with low false positive rate and high true positive rate and it takes less learning time in comparison with other existing approaches used for efficient network intrusion detection. Keywords: Information Gain, Intrusion Detection System, Instance-based classifier, K-Star, Weka.
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
IOSR Journals
The paper aims at designing a system for border surveillance using the concept of smartdust technology. Smartdusts are small dust like wireless sensor motes with multiple on-board sensors and microcontroller. In real time, thousands of such smartdust motes must be deployed in a large area. The motes can form a network among them and has wireless connection to outside world. Onboard hardware include a variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a microcontroller for processing these sensor values and a radio transceiver for communication over a wireless network. In this experimental project, we have designed one central monitoring mote and two smartdust motes using ARM controller, IEEE radio transceiver and sensors.The central monitoring mote also displays the tracking history of intrusion on enabling a switch
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
IOSR Journals
F0562732
F0562732
IOSR Journals
Recomendados
Anamorphose
Anamorphose
Sylvain Dufour
Airbus
Airbus
Sylvain Dufour
Telephone [fr]
Telephone [fr]
Enomao
Présentation de Christion Roy du Groupe Promutuel lors de l'Agile Tour 2009 Québec.
L'agilité dans le monde de l'assurance: l'expérience vécue d'un virage comple...
L'agilité dans le monde de l'assurance: l'expérience vécue d'un virage comple...
Agile Tour 2009 Québec
B0460612
B0460612
IOSR Journals
Abstract: Network security and Intrusion Detection Systems (IDS’s) is an important security related research area. This paper applies K-star algorithm with filtering analysis in order to build a network intrusion detection system. For our experimental analysis and as a case study, we have used the new NSL-KDD dataset, which is a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 66.0% for the training set and the remainder for the testing set a 2 class classifications has been implemented. WEKA which is a java based open source software consists of a collection of machine learning algorithms for Data mining tasks has been used in the testing process. The experimental results show that the proposed approach is very accurate with low false positive rate and high true positive rate and it takes less learning time in comparison with other existing approaches used for efficient network intrusion detection. Keywords: Information Gain, Intrusion Detection System, Instance-based classifier, K-Star, Weka.
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
IOSR Journals
The paper aims at designing a system for border surveillance using the concept of smartdust technology. Smartdusts are small dust like wireless sensor motes with multiple on-board sensors and microcontroller. In real time, thousands of such smartdust motes must be deployed in a large area. The motes can form a network among them and has wireless connection to outside world. Onboard hardware include a variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a microcontroller for processing these sensor values and a radio transceiver for communication over a wireless network. In this experimental project, we have designed one central monitoring mote and two smartdust motes using ARM controller, IEEE radio transceiver and sensors.The central monitoring mote also displays the tracking history of intrusion on enabling a switch
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
IOSR Journals
F0562732
F0562732
IOSR Journals
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) vol.12 issue.1version.2
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...
IOSR Journals
Sorting algorithms are the main concepts of the subject Data Structures and It’s Applications. These algorithms are designed in arranging the data elements in the sorted order. If the data elements are arranged in sorted order , then the searching is very easier. Some algorithms are comparison sort and some are noncomparison sort. The choice of a algorithm is based on the efficiency of the algorithm. I have designed one algorithm called as Alternate Sort. The main aspect is that different technique of comparisons is involed. I have presented the algorithm , It’s working and the examples and finally my paper is consisting of the program listing.
Alternate Sort
Alternate Sort
IOSR Journals
IOSR Journal of Mathematics (IOSR-JM) vol.11 issue.1 version.3
Digital Roots and Their Properties
Digital Roots and Their Properties
IOSR Journals
This paper deals with some fundamental properties of the set of strongly unique best simultaneous coapproximation in a linear 2-normed space. AMS Subject classification: 41A50,41A52,41A99, 41A28.
Strongly Unique Best Simultaneous Coapproximation in Linear 2-Normed Spaces
Strongly Unique Best Simultaneous Coapproximation in Linear 2-Normed Spaces
IOSR Journals
This study sought to analyze the effect of the delegation of authority and responsibility in the decision-making and influence of accounting controls on performance as measured by election staff, planning, supervision, representation, investigation, coordination, negotiation, evaluation and overall performance. The method of analysis used in this study is a multiple linear regression test while the sample used in this study are structural and non-structural Officials existing environment PGRI Adi Buana University Surabaya in 2013, from the Head of School to the Head of Sub Division. On the results of hypothesis testing using Individual Parameter Significance (t-test), indicating that the decentralization of decision-making than the most dominant influence on the performance of accounting control system.
Decentralization Analysis of Decision Making and Performance of Accounting Co...
Decentralization Analysis of Decision Making and Performance of Accounting Co...
IOSR Journals
IOSR Journal of Computer Engineering (IOSRJCE)
Performance analysis of Data Mining algorithms in Weka
Performance analysis of Data Mining algorithms in Weka
IOSR Journals
The advent of anonymizing networks assured that users could access internet services with complete privacy avoiding any possible hindrance. This arrangement where series of routers form a network, hide the user’s IP address from the server. However malfeasance of few malpractitioners has left this system with a loophole where users make use of this anonymity to deface popular websites. Administrators who cannot practically block a user using IP address are forced to shut all possible nodes that lead to exit. Thus deny access to both behaving and non-behavingusers altogether. And so end up blocking users with no compromise to their anonymity. Hence we propose a system which is undogmatic with different servers. Thus we aim at giving the administrator the right to block the malicious user without hindering the anonymity of the rest.
Nymble: Blocking Misbehaving Users In Anonymizing Networks
Nymble: Blocking Misbehaving Users In Anonymizing Networks
IOSR Journals
The presence of insecticide in the environment, due to extensive use in agriculture is of potential toxicological concern for fish. Histotoxicological studies have been widely used as biomarkes in the evaluation of the health of fish exposed to the pesticides studies. In the present study the hazardous effect of the organophosphate insecticide, Fenitrothion on the histology of the fresh water fish (Channa punctatus) after exposure for 21 days was investigated. Fish used in the experiment was nearly similar weight and length. The treated groups were compared with the control group for the histological changes in the selected tissue (kidney, liver and heart) and marked changes were observed.
Effects of Fenitrothion on some histo-architecture of freshwater fish Channa ...
Effects of Fenitrothion on some histo-architecture of freshwater fish Channa ...
IOSR Journals
The Deccan Intertrappean flora is mostly silicified and often very well preserved, representing the groups Thallophyta (fungi, algae and charophytes), water ferns, conifers and angiosperms with both monocotyledons and dicotyledons. The present wood is collected from the Deccan Intertrappean beds of Mohgaonkalan. The wood is angiospermic diffuse porus, vessels solitary and in multiples of two, usually small, occasionally of medium size. Xylem parenchyma scanty with paratracheal vasicentri type, Intervascular pitting are simple and alternate.Perforation plate simple. Fibers are non-septate and storied. Wood rays uniseriate only. Rays are homogenous and made up of procumbent cells only. It show its affinities with the reported species of Aeschynomene.
A Fossil Dicot Wood Aeschynomenoxylon Mohgaonsesp.Nov From The Deccan Intertr...
A Fossil Dicot Wood Aeschynomenoxylon Mohgaonsesp.Nov From The Deccan Intertr...
IOSR Journals
Strategic competitiveness is achieved when a firm successfully formulate and implement a strategy of value creation. In order to create competitive advantage, the theory of competitive advantage have contributed to the present two major schools of the Market-Based View (MBV) and Resources-Based View (RBV), which both lead the company in creating a competitive advantage through superior value. The purpose of this paper is to examine the relationship between market orientation, learning organization and dynamic capability on value creation. Using a questionnaire survey, the paper is based on data collected from 105 owners or managers of industry creative in Indonesia. The partial least squares (PLS) structural equation modeling approach was used to analyze the data and test the hypotheses.The results indicate that, among the market orientation, learning organization, dynamic capability are significantly and positively related to value creation.
Market Orientation, Learning Organization and Dynamic Capability as Anteceden...
Market Orientation, Learning Organization and Dynamic Capability as Anteceden...
IOSR Journals
Abstract: Simultaneous transmission of data from one sender to multiple receivers is called multicasting. Several widely used applications require multicasting at least at the logical level. Examples include audio video teleconferencing, real time video streaming and the maintenance of distributed databases. In many cases it is advantageous to implement multicasting at the level of the routing algorithm (other approaches would be oneto-all unicast or the implementation of multicasting at the application layer). In this paper we are presenting a comparative analysis on various multicast routing protocols in adhoc networks. Keywords: multicasting, multicast protocols,dynamic core, performance evaluation,Qos Parameters
A comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETs
IOSR Journals
B0510916
B0510916
IOSR Journals
IOSR Journal of Computer Engineering (IOSRJCE)
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
IOSR Journals
IOSR Journal of Computer Engineering (IOSRJCE)
A middleware approach for high level overlay network
A middleware approach for high level overlay network
IOSR Journals
Centrifugal pump is world one of the oldest water pumping devises. The current work deals study Shaft of centrifugal pump for static and dynamic analysis. As we know rotodynamic machineries are designed keenly as there is lot of fluctuation in the loads and speeds. The shaft is analyzed by using finite element analysis technique for stresses and deflections. The total work is carried out in two stages first stage is static analysis. In this stage pump shaft is analyzed for stresses and deflection and same results are verified using graphical integration method. And second for dynamic analysis, in this stage result obtained by static analysis are used to calculate dynamic forces coming in pump shaft. Again shaft is analyzed in dynamic input condition and results are verified by using graphical integration method. The software used for the finite element meshing is HYPERMESH and solver used is RADIOSS. Result values obtained for deflection and stresses are compared in both cases. Result obtained by graphical method and FEA are nearly similar and are in acceptable limits.
Finite Element Analysis of Shaft of Centrifugal Pump
Finite Element Analysis of Shaft of Centrifugal Pump
IOSR Journals
Padmanabhan and Ganeshan have obtained some results on Hadamard product of univalent functions with negative coefficients of the type f (z) z a z , a 0. 2n n 1 2n 2n In this paper we have obtained coefficient bounds and convolution results of p-valent function
On Hadamard Product of P-Valent Functions with Alternating Type
On Hadamard Product of P-Valent Functions with Alternating Type
IOSR Journals
331 Vertigineux!(J Fo)
331 Vertigineux!(J Fo)
Sylvain Dufour
IOSR Journal of Computer Engineering (IOSRJCE)
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication schema
IOSR Journals
Abstract: Today availability of e- resources in a college library is very common. But their proper and maximum use is a matter for discussion. The present paper examines the existence of various e- resource databases in Siddhivinayak technical campus college library. The study also highlights the preferences and importance of online resources among the teacher and students.
E- Resource for Technical Institute & Engineering Colleges a Boon to librarie...
E- Resource for Technical Institute & Engineering Colleges a Boon to librarie...
IOSR Journals
Abstract :Multimedia data security is becoming important with the continuous increase of digital communications on internet. With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. . The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. Therefore, there is a great demand for secured data storage and transmission techniques. Information security has traditionally been ensured with data encryption and authentication techniques. The secrecy of communication is maintained by secret key exchange. In effect the strength of the algorithm depends solely on the length of the key. The presented work aims at secure video transmission using randomness in encryption algorithm, thereby creating more confusion to obtain the original data. The security of the original cipher has been enhanced by addition of impurities to misguide the cryptanalyst. Since the encryption process is one way function, the artificial neural networks are best suited for this purpose as they possess features like high security, no distortion and its ability to perform for non linear input-output characteristics, In the presented work the need for key exchange is also eliminated, which is otherwise a perquisite for most of the algorithms used today. The proposed work finds its application in medical imaging systems, military image database communication and confidential video conferencing, and similar such application. The results are obtained through the use of MATLAB 7.14.0 Keywords: Artificial Neural networks, Back propagation algorithm, video encryption and decryption, cipher and decipher
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
IOSR Journals
Copeaux de bois
Copeaux de bois
Sylvain Dufour
Doigts d'artiste
Doigts d'artiste
Sylvain Dufour
Mais conteúdo relacionado
Destaque
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) vol.12 issue.1version.2
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...
IOSR Journals
Sorting algorithms are the main concepts of the subject Data Structures and It’s Applications. These algorithms are designed in arranging the data elements in the sorted order. If the data elements are arranged in sorted order , then the searching is very easier. Some algorithms are comparison sort and some are noncomparison sort. The choice of a algorithm is based on the efficiency of the algorithm. I have designed one algorithm called as Alternate Sort. The main aspect is that different technique of comparisons is involed. I have presented the algorithm , It’s working and the examples and finally my paper is consisting of the program listing.
Alternate Sort
Alternate Sort
IOSR Journals
IOSR Journal of Mathematics (IOSR-JM) vol.11 issue.1 version.3
Digital Roots and Their Properties
Digital Roots and Their Properties
IOSR Journals
This paper deals with some fundamental properties of the set of strongly unique best simultaneous coapproximation in a linear 2-normed space. AMS Subject classification: 41A50,41A52,41A99, 41A28.
Strongly Unique Best Simultaneous Coapproximation in Linear 2-Normed Spaces
Strongly Unique Best Simultaneous Coapproximation in Linear 2-Normed Spaces
IOSR Journals
This study sought to analyze the effect of the delegation of authority and responsibility in the decision-making and influence of accounting controls on performance as measured by election staff, planning, supervision, representation, investigation, coordination, negotiation, evaluation and overall performance. The method of analysis used in this study is a multiple linear regression test while the sample used in this study are structural and non-structural Officials existing environment PGRI Adi Buana University Surabaya in 2013, from the Head of School to the Head of Sub Division. On the results of hypothesis testing using Individual Parameter Significance (t-test), indicating that the decentralization of decision-making than the most dominant influence on the performance of accounting control system.
Decentralization Analysis of Decision Making and Performance of Accounting Co...
Decentralization Analysis of Decision Making and Performance of Accounting Co...
IOSR Journals
IOSR Journal of Computer Engineering (IOSRJCE)
Performance analysis of Data Mining algorithms in Weka
Performance analysis of Data Mining algorithms in Weka
IOSR Journals
The advent of anonymizing networks assured that users could access internet services with complete privacy avoiding any possible hindrance. This arrangement where series of routers form a network, hide the user’s IP address from the server. However malfeasance of few malpractitioners has left this system with a loophole where users make use of this anonymity to deface popular websites. Administrators who cannot practically block a user using IP address are forced to shut all possible nodes that lead to exit. Thus deny access to both behaving and non-behavingusers altogether. And so end up blocking users with no compromise to their anonymity. Hence we propose a system which is undogmatic with different servers. Thus we aim at giving the administrator the right to block the malicious user without hindering the anonymity of the rest.
Nymble: Blocking Misbehaving Users In Anonymizing Networks
Nymble: Blocking Misbehaving Users In Anonymizing Networks
IOSR Journals
The presence of insecticide in the environment, due to extensive use in agriculture is of potential toxicological concern for fish. Histotoxicological studies have been widely used as biomarkes in the evaluation of the health of fish exposed to the pesticides studies. In the present study the hazardous effect of the organophosphate insecticide, Fenitrothion on the histology of the fresh water fish (Channa punctatus) after exposure for 21 days was investigated. Fish used in the experiment was nearly similar weight and length. The treated groups were compared with the control group for the histological changes in the selected tissue (kidney, liver and heart) and marked changes were observed.
Effects of Fenitrothion on some histo-architecture of freshwater fish Channa ...
Effects of Fenitrothion on some histo-architecture of freshwater fish Channa ...
IOSR Journals
The Deccan Intertrappean flora is mostly silicified and often very well preserved, representing the groups Thallophyta (fungi, algae and charophytes), water ferns, conifers and angiosperms with both monocotyledons and dicotyledons. The present wood is collected from the Deccan Intertrappean beds of Mohgaonkalan. The wood is angiospermic diffuse porus, vessels solitary and in multiples of two, usually small, occasionally of medium size. Xylem parenchyma scanty with paratracheal vasicentri type, Intervascular pitting are simple and alternate.Perforation plate simple. Fibers are non-septate and storied. Wood rays uniseriate only. Rays are homogenous and made up of procumbent cells only. It show its affinities with the reported species of Aeschynomene.
A Fossil Dicot Wood Aeschynomenoxylon Mohgaonsesp.Nov From The Deccan Intertr...
A Fossil Dicot Wood Aeschynomenoxylon Mohgaonsesp.Nov From The Deccan Intertr...
IOSR Journals
Strategic competitiveness is achieved when a firm successfully formulate and implement a strategy of value creation. In order to create competitive advantage, the theory of competitive advantage have contributed to the present two major schools of the Market-Based View (MBV) and Resources-Based View (RBV), which both lead the company in creating a competitive advantage through superior value. The purpose of this paper is to examine the relationship between market orientation, learning organization and dynamic capability on value creation. Using a questionnaire survey, the paper is based on data collected from 105 owners or managers of industry creative in Indonesia. The partial least squares (PLS) structural equation modeling approach was used to analyze the data and test the hypotheses.The results indicate that, among the market orientation, learning organization, dynamic capability are significantly and positively related to value creation.
Market Orientation, Learning Organization and Dynamic Capability as Anteceden...
Market Orientation, Learning Organization and Dynamic Capability as Anteceden...
IOSR Journals
Abstract: Simultaneous transmission of data from one sender to multiple receivers is called multicasting. Several widely used applications require multicasting at least at the logical level. Examples include audio video teleconferencing, real time video streaming and the maintenance of distributed databases. In many cases it is advantageous to implement multicasting at the level of the routing algorithm (other approaches would be oneto-all unicast or the implementation of multicasting at the application layer). In this paper we are presenting a comparative analysis on various multicast routing protocols in adhoc networks. Keywords: multicasting, multicast protocols,dynamic core, performance evaluation,Qos Parameters
A comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETs
IOSR Journals
B0510916
B0510916
IOSR Journals
IOSR Journal of Computer Engineering (IOSRJCE)
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
IOSR Journals
IOSR Journal of Computer Engineering (IOSRJCE)
A middleware approach for high level overlay network
A middleware approach for high level overlay network
IOSR Journals
Centrifugal pump is world one of the oldest water pumping devises. The current work deals study Shaft of centrifugal pump for static and dynamic analysis. As we know rotodynamic machineries are designed keenly as there is lot of fluctuation in the loads and speeds. The shaft is analyzed by using finite element analysis technique for stresses and deflections. The total work is carried out in two stages first stage is static analysis. In this stage pump shaft is analyzed for stresses and deflection and same results are verified using graphical integration method. And second for dynamic analysis, in this stage result obtained by static analysis are used to calculate dynamic forces coming in pump shaft. Again shaft is analyzed in dynamic input condition and results are verified by using graphical integration method. The software used for the finite element meshing is HYPERMESH and solver used is RADIOSS. Result values obtained for deflection and stresses are compared in both cases. Result obtained by graphical method and FEA are nearly similar and are in acceptable limits.
Finite Element Analysis of Shaft of Centrifugal Pump
Finite Element Analysis of Shaft of Centrifugal Pump
IOSR Journals
Padmanabhan and Ganeshan have obtained some results on Hadamard product of univalent functions with negative coefficients of the type f (z) z a z , a 0. 2n n 1 2n 2n In this paper we have obtained coefficient bounds and convolution results of p-valent function
On Hadamard Product of P-Valent Functions with Alternating Type
On Hadamard Product of P-Valent Functions with Alternating Type
IOSR Journals
331 Vertigineux!(J Fo)
331 Vertigineux!(J Fo)
Sylvain Dufour
IOSR Journal of Computer Engineering (IOSRJCE)
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication schema
IOSR Journals
Abstract: Today availability of e- resources in a college library is very common. But their proper and maximum use is a matter for discussion. The present paper examines the existence of various e- resource databases in Siddhivinayak technical campus college library. The study also highlights the preferences and importance of online resources among the teacher and students.
E- Resource for Technical Institute & Engineering Colleges a Boon to librarie...
E- Resource for Technical Institute & Engineering Colleges a Boon to librarie...
IOSR Journals
Abstract :Multimedia data security is becoming important with the continuous increase of digital communications on internet. With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. . The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. Therefore, there is a great demand for secured data storage and transmission techniques. Information security has traditionally been ensured with data encryption and authentication techniques. The secrecy of communication is maintained by secret key exchange. In effect the strength of the algorithm depends solely on the length of the key. The presented work aims at secure video transmission using randomness in encryption algorithm, thereby creating more confusion to obtain the original data. The security of the original cipher has been enhanced by addition of impurities to misguide the cryptanalyst. Since the encryption process is one way function, the artificial neural networks are best suited for this purpose as they possess features like high security, no distortion and its ability to perform for non linear input-output characteristics, In the presented work the need for key exchange is also eliminated, which is otherwise a perquisite for most of the algorithms used today. The proposed work finds its application in medical imaging systems, military image database communication and confidential video conferencing, and similar such application. The results are obtained through the use of MATLAB 7.14.0 Keywords: Artificial Neural networks, Back propagation algorithm, video encryption and decryption, cipher and decipher
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
IOSR Journals
Destaque
(20)
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...
Alternate Sort
Alternate Sort
Digital Roots and Their Properties
Digital Roots and Their Properties
Strongly Unique Best Simultaneous Coapproximation in Linear 2-Normed Spaces
Strongly Unique Best Simultaneous Coapproximation in Linear 2-Normed Spaces
Decentralization Analysis of Decision Making and Performance of Accounting Co...
Decentralization Analysis of Decision Making and Performance of Accounting Co...
Performance analysis of Data Mining algorithms in Weka
Performance analysis of Data Mining algorithms in Weka
Nymble: Blocking Misbehaving Users In Anonymizing Networks
Nymble: Blocking Misbehaving Users In Anonymizing Networks
Effects of Fenitrothion on some histo-architecture of freshwater fish Channa ...
Effects of Fenitrothion on some histo-architecture of freshwater fish Channa ...
A Fossil Dicot Wood Aeschynomenoxylon Mohgaonsesp.Nov From The Deccan Intertr...
A Fossil Dicot Wood Aeschynomenoxylon Mohgaonsesp.Nov From The Deccan Intertr...
Market Orientation, Learning Organization and Dynamic Capability as Anteceden...
Market Orientation, Learning Organization and Dynamic Capability as Anteceden...
A comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETs
B0510916
B0510916
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A middleware approach for high level overlay network
A middleware approach for high level overlay network
Finite Element Analysis of Shaft of Centrifugal Pump
Finite Element Analysis of Shaft of Centrifugal Pump
On Hadamard Product of P-Valent Functions with Alternating Type
On Hadamard Product of P-Valent Functions with Alternating Type
331 Vertigineux!(J Fo)
331 Vertigineux!(J Fo)
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication schema
E- Resource for Technical Institute & Engineering Colleges a Boon to librarie...
E- Resource for Technical Institute & Engineering Colleges a Boon to librarie...
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
Mais de Sylvain Dufour
Copeaux de bois
Copeaux de bois
Sylvain Dufour
Doigts d'artiste
Doigts d'artiste
Sylvain Dufour
Harakiri
Harakiri
Sylvain Dufour
Salvador Dali
Salvador Dali
Sylvain Dufour
Le miroir de sel
Le miroir de sel
Sylvain Dufour
Creations
Creations
Sylvain Dufour
Photos de journalistes
Photos de journalistes
Sylvain Dufour
Dessin sur feuille
Dessin sur feuille
Sylvain Dufour
Publicité mondiale personalisée
Publicité mondiale personalisée
Sylvain Dufour
Belles images sur les décorations chinoises
Lanternes chinoises
Lanternes chinoises
Sylvain Dufour
Voituressales
Voituressales
Sylvain Dufour
Ca en fait des aperos
Ca en fait des aperos
Sylvain Dufour
Superbes prises de vues
Superbes prises de vues
Sylvain Dufour
Ca c'est du boulot !!!
Ca c'est du boulot !!!
Sylvain Dufour
Mal de mer
Mal de mer
Sylvain Dufour
C est réparé 3
C est réparé 3
Sylvain Dufour
Deces du bon sens ...
Deces du bon sens ...
Sylvain Dufour
Photographiques historiques
Photographiques historiques
Sylvain Dufour
La faune
La faune
Sylvain Dufour
La tour Effel
La tour Effel
Sylvain Dufour
Mais de Sylvain Dufour
(20)
Copeaux de bois
Copeaux de bois
Doigts d'artiste
Doigts d'artiste
Harakiri
Harakiri
Salvador Dali
Salvador Dali
Le miroir de sel
Le miroir de sel
Creations
Creations
Photos de journalistes
Photos de journalistes
Dessin sur feuille
Dessin sur feuille
Publicité mondiale personalisée
Publicité mondiale personalisée
Lanternes chinoises
Lanternes chinoises
Voituressales
Voituressales
Ca en fait des aperos
Ca en fait des aperos
Superbes prises de vues
Superbes prises de vues
Ca c'est du boulot !!!
Ca c'est du boulot !!!
Mal de mer
Mal de mer
C est réparé 3
C est réparé 3
Deces du bon sens ...
Deces du bon sens ...
Photographiques historiques
Photographiques historiques
La faune
La faune
La tour Effel
La tour Effel
Avoir de l'estomac
1.
Un serpent peut-il
avaler kangourou ? Ou qui a les yeux plus gros que le ventre …
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
Bon app …
Baixar agora