Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Split-Network in Wireless Sensor Network:Attack and Countermeasures
Chunlai Du, Jianshun Zhang, Li Ma
Efficient Hand off using Fuzzy and Simulated Annealing
Vikas.M.N, Keshava.K.N, Prabhas.R.K, Hameem Shanavas.I
A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice
Ruisong Ye, Wei Zhou
Enhancing Hash Function Selection Techniques Based on Message Contents
Ali Saeed, Muhammad Khalil Shahid
Hardware Implementation of Elliptic Curve Cryptography over Binary Field
Sandeep S.V, Hameem Shanavas.I, Nallusamy.V, Brindha.M
Improved Multi-Path and Multi-Speed Routing Protocol in Wireless Sensor Networks
S. Saqaeeyan, M. Roshanzadeh
Error Detection & Correction in Wireless Sensor Networks By Using Residue Number Systems
M. Roshanzadeh, S. Saqaeeyan
A Novel Security Scheme for Secret Data using Cryptography and Steganography
Phad Vitthal S., Bhosale Rajkumar S., Panhalkar Archana R.
Fast Vertical Handover Algorithm for Vehicular Communication: A Holistic Approach
Sourav Dhar, Shubhajit Datta, Rabindra Nath Bera, Amitava Ray
Free Space Optical Channel Characterization and Modeling with Focus on Algeria Weather Conditions
Mehdi ROUISSAT, A. Riad BORSALI, Mohammad E. CHIKH-BLED
Attacks Due to Flaw of Protocols Used In Network Access Control (NAC), Their Solutions and Issues: A Survey
Snehasish Parhi
Investigations of Cellular Automata Linear Rules for Edge Detection
Fasel Qadir, Khan K. A.
Intelligent Wireless Sensor Network System to shrink Suspected Terror from Militants
SanjeevPuri
A Packet Routing Model for Computer Networks
O. Osunade
An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks
S. Santhosh Baboo, K. Gokulraj
Asymptotic Stability Analysis of E-speed Start Congestion Control Protocol for TCP
Oyeyinka I.K., Akinwale A.T., Folorunso O., Olowofela J.A., Oluwatope A.
A Hierarchical Load Balancing Policy for Grid Computing Environment
Said Fathy El-Zoghdy
Battering Keyloggers and Screen Recording Software by Fabricating Passwords
Nairit Adhikary, Rohit Shrivastava, Ashwani Kumar, Sunil Kumar Verma, Monark Bag, Vrijendra Singh
IEATH: Improved Energy Aware and Two Hop Multipath Routing Protocol in Wireless Sensor Networks
S. Saqaeeyan, M. Roshanzadeh
Congestion Control in 4G Wireless Networks Using Coalition Game
S. V. Saboji, C. B. Akki
A Modified Hill Cipher using Randomized Approach
A.V.N.Krishna, K.Madhuravani
An Analytical Assessment on Document Clustering
Pushplata, Ram Chatterjee
QSWMCA - Quality of Service in Wireless Mesh Networks by Configuration Arguments
N.Kannaiya Raja, R. Saritha, A.Senthamaraiselvan, K. Arulanandam
Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks
Manjusha Pandey, Shekhar Verma
Multi-User Quantum Key Distribution Using Wavelength Division Multiplexing
P. Lokesh Kumar Reddy, B. Rama Bhupal Reddy, S. Rama Krishna
Preventive Aspect of Black Hole Attack in Mobile AD HOC Network
Kumar Roshan, Vimal Bibhu
Dynamic Inter Arrival Time Based Seamless Handoff for Mobile WIMAX Ping-Pong Calls Bypassing PKMv2 EAP Authentication
B.Sridevi, S.Rajaram
UML Based Integrated Multilevel Checkpointing Algorithms for Cloud Computing Environment
Dilbag Singh, Jaswinder Singh, Amit Chhabra
Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment
Basappa B. Kodada, Gaurav Prasad, Alwyn R. Pais
Image Encryption Using Chaotic Map and Block Chaining
IIbrahim S. I. Abuhaiba, Hanan M. Abuthraya, Huda B. Hubboub, Ruba A. Salamah
A Robust Image Steganography using DWT Difference Modulation (DWTDM)
Souvik Bhattacharyya, Gautam Sanyal
An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps
Ruisong Ye, Haiying Zhao
Impact of Physical Layer Jamming on Wireless Sensor Networks with Shadowing and Multicasting
Nischay Bahl, Ajay K. Sharma, Harsh K. Verma
Application of Biometrics in Mobile Voting
Donovan Gentles, Suresh Sankaranarayanan
Estimating the Video Registration Using Image Motions
N.Kannaiya Raja, K.Arulanandam, R.Radha krishnan, M.Nataraj
Cryptography Using Multiple Two-Dimensional Chaotic Maps
Ibrahim S. I. Abuhaiba, Amina Y. AlSallut, Hana H. Hejazi, Heba A. AbuGhali
A New Approach for Multicast Routing in Wireless Mesh Networks
Mustapha GUEZOURI, Ali KADDOURI
Mining Data Streams using Option Trees
B.Reshma Yusuf, P.Chenna Reddy
Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition
V.K. NARENDIRA KUMAR, B. SRINIVASAN
Methodology for Benchmarking IPsec Gateways
Adam Tisovský, Ivan Baroňák