- Collection
- 2009 Fall ASEE Middle Atlantic Section Conference
- Authors
-
Qinghai Gao; Xiaowen Zhang; Michael Anshel
.[23] Gao, Q., Zhang, X., and Anshel, M. (2008). Introduction to Geometric Intronization as a SecurityTechnique. International Journal of Computer Science and Network Security, 8(12): 19-25.[24] Doig, A. (1997). Improving the Efficiency of the Genetic Code by Varying the Codon Length-ThePerfect Genetic Code. Journal of Theoretical Biology, 188 (3): 355-360. 6Appendix : Natural Genetic Code Amino Acid Acronym RNA Codons Ratio Gly G GGU, GGC, GGA, GGG 4 Ala A GCU, GCC, GCA, GCG 4 Pro P CCU, CCC, CCA, CCG
- Collection
- 2009 Fall ASEE Middle Atlantic Section Conference
- Authors
-
Qinghai Gao
-82.[4] F. Monrose, M.K. Reiter, Q. Li and S. Wetzel. Cryptographic key generation from voice. Proc. of the 2001 IEEESymposium on Security and Privacy, May 2001.[5] F. Monrose, M. K. Reiter, Q. Li, D. P. Lopresti, and C. Shih. Toward speech-generated cryptographic keys onresource constrained devices. Pro.c of 11th USENIX Security Symposium, 2002, pp. 283-296.[6] F. Hao and C. Chan. Private key generation from on-line handwritten signatures. Information Management &Computer Security, 10(2), 2003, pp. 159-164. 6[7]A. Goh and D. Ngo. Computation of cryptographic keys from face biometrics. Lecture Notes in ComputerScience, 2828, 2003, pp. 1
- Collection
- 2009 Fall ASEE Middle Atlantic Section Conference
- Authors
-
David Hergert
"I" 001001100 "L" 001000011"M" 101000010 "N" 000010011 "O" 100010010 "P" 001010010 "Q" 000000111 "R" 100000110 "S" 001000110 "T" 000010110 "U" 110000001 "V" 011000001 "W" 111000000 "X" 010010001 "Y" 110100000 "Z" 011010000 "0" 000110100 "1" 100100001 "2" 001100001 "3" 101100000 "4" 000110001 "5" 100110000 "6" 001110000 "7" 000100101 "8" 100100100 "9" 001100100 "" 011000100 "-" 010000101 "." 110000100 "*" 010010100Figure 4. Code 39 Barcode TableFigure 5. Flow Chart To Find the Start of the BarcodeFigure 6. Flow Chart For Processing The BarcodeFigure 7. Flow Chart for Converting the Barcode
- Collection
- 2009 Fall ASEE Middle Atlantic Section Conference
- Authors
-
B. Samanta
b w q y p x + Π Φ - e COPSO Fig. 1 Structure of single multiplicative neuron model with COPSO laerning (COPSO-SMN) Fig. 2 Basic structure of ANFIS 0.2 Swarm1