Asee peer logo
Displaying all 4 results
Collection
2009 Fall ASEE Middle Atlantic Section Conference
Authors
Qinghai Gao; Xiaowen Zhang; Michael Anshel
.[23] Gao, Q., Zhang, X., and Anshel, M. (2008). Introduction to Geometric Intronization as a SecurityTechnique. International Journal of Computer Science and Network Security, 8(12): 19-25.[24] Doig, A. (1997). Improving the Efficiency of the Genetic Code by Varying the Codon Length-ThePerfect Genetic Code. Journal of Theoretical Biology, 188 (3): 355-360. 6Appendix : Natural Genetic Code Amino Acid Acronym RNA Codons Ratio Gly G GGU, GGC, GGA, GGG 4 Ala A GCU, GCC, GCA, GCG 4 Pro P CCU, CCC, CCA, CCG
Collection
2009 Fall ASEE Middle Atlantic Section Conference
Authors
Qinghai Gao
-82.[4] F. Monrose, M.K. Reiter, Q. Li and S. Wetzel. Cryptographic key generation from voice. Proc. of the 2001 IEEESymposium on Security and Privacy, May 2001.[5] F. Monrose, M. K. Reiter, Q. Li, D. P. Lopresti, and C. Shih. Toward speech-generated cryptographic keys onresource constrained devices. Pro.c of 11th USENIX Security Symposium, 2002, pp. 283-296.[6] F. Hao and C. Chan. Private key generation from on-line handwritten signatures. Information Management &Computer Security, 10(2), 2003, pp. 159-164. 6[7]A. Goh and D. Ngo. Computation of cryptographic keys from face biometrics. Lecture Notes in ComputerScience, 2828, 2003, pp. 1
Collection
2009 Fall ASEE Middle Atlantic Section Conference
Authors
David Hergert
"I" 001001100 "L" 001000011"M" 101000010 "N" 000010011 "O" 100010010 "P" 001010010 "Q" 000000111 "R" 100000110 "S" 001000110 "T" 000010110 "U" 110000001 "V" 011000001 "W" 111000000 "X" 010010001 "Y" 110100000 "Z" 011010000 "0" 000110100 "1" 100100001 "2" 001100001 "3" 101100000 "4" 000110001 "5" 100110000 "6" 001110000 "7" 000100101 "8" 100100100 "9" 001100100 "" 011000100 "-" 010000101 "." 110000100 "*" 010010100Figure 4. Code 39 Barcode TableFigure 5. Flow Chart To Find the Start of the BarcodeFigure 6. Flow Chart For Processing The BarcodeFigure 7. Flow Chart for Converting the Barcode
Collection
2009 Fall ASEE Middle Atlantic Section Conference
Authors
B. Samanta
b  w q y p x  +  Π  Φ  -  e  COPSO   Fig. 1 Structure of single multiplicative neuron model with COPSO laerning (COPSO-SMN) Fig. 2 Basic structure of ANFIS 0.2 Swarm1