[PDF][PDF] Character Recognition using Approaches of Artificial Neural Network: A Review.

A Aggarwal, S Gaba, P Singh, S Chawla - ITTAP, 2022 - ceur-ws.org
Methods based on learning from examples that have been widely applied to character
recognition are considered as one of the classification methods. This class of methods …

[PDF][PDF] Cryptography: Avalanche effect of AES and RSA

R Verma, AK Sharma - International Journal of Scientific and …, 2020 - academia.edu
Security is a major concern in the field of computer science. With the advancement in
technology security of data from theft has become a major obstacle. It is necessary to encrypt …

[PDF][PDF] Implementation of Improved Cryptography Algorithm

R Verma, J Dhiman - International Journal of Information Technology …, 2022 - academia.edu
A network is an interconnected group of independent computing devices which uses a
different set of protocols to communicate with each other independently and meaningfully …

Fingerprint and Qr Code Based Authentication System at Pusat Servis Komputer JB

MF Jamal, N Rahim - Applied Information Technology And …, 2023 - publisher.uthm.edu.my
With the rise in data breaches and identity theft, more robust authentication methods are
clearly required. It occurs when someone steals another person's information and uses to …