Электротехника - 621.3

Научные статьи

В разделе "Электротехника"
VLSI implementation of CMOS full adders with low leakage power
Manisha B. S., Rudraswamy S. B.
Fuzzy rule based inference system for implementation of naval military mission
Rashmi Singh, Vipin Saxena
Intelligent energy aware fidelity based on-demand secure routing protocol for MANET
Himadri N. Saha, Prachatos Mitra
Impact of IPv4, IPv6 and dual stack interface over wireless networks
Varsha Jain, Damodar Tiwari, Shailendra Singh, Sanjeev Sharma
a novel energy efficient routing protocol EACBM for scalable wireless sensor networks
Amanjot Singh Toor, A.K. Jain
A novel approach to thwart security attacks on mobile pattern authentication systems
Bh Padma, GVS Raj Kumar
Security evaluation of cellular networks handover techniques
Vincent Omollo Nyangaresi, Silvance O. Abeka, Anthony Rodgrigues
Ensure symmetrical traffic flow, to prevent the dropping of response packet by the firewall, on the active-active data centers
Irwan Piesessa, Benfano Soewito
Improving the performance of fuzzy minimum spanning tree based routing process through P-node fuzzy multicasting approach in MANET
Soham Bandyopadhyay, Sunil Karforma
Efficient multimedia transmission over scalable IoT architecture
Vasileios A. Memos
Alleviating malicious insider attacks in MANET using a multipath on-demand security mechanism
Shahnawaz Ahmad
A combined TCP-friendly rate control with WFQ approach for congestion control for MANET
Y. Narasimha Reddy, P V S. Srinivas
Real time universal scalable wireless sensor network for environmental monitoring application
Idakwo Monday Abutu, Umoh J. Imeh, Tekanyi M.S Abdoulie, Adedokun E. Adewale, Muazu M. Bashir
An experimental evaluation of tools for estimating bandwidth-related metrics
Fatih Abut, Martin Leischner
Assessing vulnerability of mobile messaging apps to man-in-the-middle (MitM) attack
Rishabh Dudheria
Performance evaluation of AODV, DSDV, OLSR routing protocols using NS-3 simulator
Radha Raman Chandan, Bindeshwar Singh Kushwaha, Pramod Kumar Mishra
Through the diversity of bandwidth-related metrics, estimation techniques and tools: an overview
Fatih Abut
Internet of things for the prevention of black hole using fingerprint authentication and genetic algorithm optimization
Pooja Chandel, Rakesh Kumar
Parallel prefix sum algorithm on optoelectronic biswapped network hyper hexa-cell
Ashish Gupta, Bikash Kanti Sarkar
A solution for water factories in Vietnam using automatic meter reading technology
Vu Chien Thang
A multi QoS genetic-based adaptive routing in wireless mesh networks with pareto solutions
Ibraheem Kasim Ibraheem, Alyaa Abdul-Hussain Al-Hussainy
Performance comparison of steganography techniques
Rinku Sharma, Reema Ganotra, Sangeeta Dhall, Shailender Gupta
Reliability evaluation and analysis of interconnection network using edge-disjoint minimal path method
Ranjan Kumar Dash, Deepak Kumar Panda
Component importance measures based risk and reliability analysis of Vehicular Ad Hoc Networks
Rakhi, G.L.Pahuja
Acknowledgement based localization method (ALM) to improve the positioning in vehicular ad hoc networks
M. Chitra, S. Siva Sathya
A novel infrared (IR) based sensor system for human presence detection in targeted locations
Kakelli Anil Kumar, Omkar Dhadge
performance analysis of underwater acoustic communication using IDMA-OFDM-MIMO with reed Solomon and turbo code
Rajashri Khanai, Salma S. Shahapur, Dattaprasad Torse
Underwater sensor networks: an efficient node deployment technique for enhancing coverage and connectivity: END-ECC
Kamal Kumar Gola, Bhumika Gupta
Identification of compromised nodes in MANETs using machine learning technique
Rodney Sebopelo, Bassey Isong, Naison Gasela
A comparative study of recent steganography techniques for multiple image formats
Arshiya Sajid Ansari, Mohammad Sajid Mohammadi, Mohammad Tanvir Parvez
A chaotic cryptosystem using conjugate transcendental fractal function
Shafali Agarwal
Performance analysis of convolution code with variable constraint length in shallow underwater acoustic communication
Krishnamoorthy Narasu Raghavan, Suriyakala C. D., Ramadevi Rathinasabapathy, Marshiana Devaerakkam, Sujatha Kumaran
An efficient image block encryption for key generation using non-uniform cellular automata
G. Kumaresan, N. P. Gopalan, T. Vetriselvi
PSO and TLBO based reliable placement of controllers in SDN
Ashutosh Kumar Singh, Naveen Kumar, Shashank Srivastava
Inculcating global optimization in ZRP through newfangled firefly algorithm
Neha Sharma, Usha Batra, Sherin Zafar
Interference effect of ACL’s and SCO’s IEEE 802.15 transmission on IEEE 802.11 performance
Adhi Rizal, Susilawati
The AODV extension protocol named AODV_SPB
Amina Guidoum, Aoued Boukelif
Network intrusion detection system based PSO-SVM for cloud computing
Mahmoud M. Sakr, Medhat A. Tawfeeq, Ashraf B. El-Sisi
Comprehensive study of data aggregation models, challenges and security issues in wireless sensor networks
Veena I. Puranikmath, Sunil S. Harakannanavar, Satyendra Kumar, Dattaprasad Torse
A novel scheme for isolation of distributed denial of service attack in VANETs
Palak Shandil, Rakesh Kumar