Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Optimizing the CMTS to Improve Quality of Service in Next Generation Networks based on ACO Algorithm
Dac-Nhuong Le
QoS Enabled Probabilistic Routing for Heterogeneous Wireless Sensor Networks
Sanjay Kumar, Mayank Dave, Surender Dahiya
A Study on Contributory Group Key Agreements for Mobile Ad Hoc Networks
CH. V. Raghavendran, G. Naga Satish, P. Suresh Varma
Criteria Specifications for the Comparison and Evaluation of Access Control Models
Shabnam Mohammad Hasani, Nasser Modiri
A Bespoke Technique for Secret Messaging
Mahimn Pandya, Hiren Joshi, Ashish Jani
Effect of Black Hole Attack on MANET Routing Protocols
Jaspal Kumar, M. Kulkarni, Daya Gupta
Enhancing the Discrete Particle Swarm Optimization based Workflow Grid Scheduling using Hierarchical Structure
Ritu Garg, Awadhesh Kumar Singh
Location Prediction of Mobility Management Using Soft Computing Techniques in Cellular Network
Smita Parija, Santosh Kumar Nanda, Prasanna Kumar Sahu, Sudhansu Sekhar Singh
A Fair Downlink Scheduling Algorithm for 3GPP LTE Networks
S. M. Chadchan, C. B. Akki
A Robust Fault Detection Scheme for the Advanced Encryption Standard
Hassen Mestiri, Noura Benhadjyoussef, Mohsen Machhout, Rached Tourki
A New Proposal for Route Finding in Mobile AdHoc Networks
H.Vignesh Ramamoorthy, D.Suganya Devi
Wi-Fi Networks Security and Accessing Control
Tarek S. Sobh
Image Encryption based on the RGB PIXEL Transposition and Shuffling
Quist-Aphetsi Kester
Adaptive Population Sizing Genetic Algorithm Assisted Maximum Likelihood Detection of OFDM Symbols in the Presence of Nonlinear Distortions
K. Seshadri Sastry, M.S.Prasad Babu
Integrity Protecting and Privacy Preserving Data Aggregation Protocols in Wireless Sensor Networks: A Survey
Joyce Jose, M. Princy, Josna Jose
Analysis of the SYN Flood DoS Attack
Mitko Bogdanoski, Tomislav Shuminoski, Aleksandar Risteski
Information Leakage Prevention Using Virtual Disk Drive
Tarek S. Sobh
A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer
Maria Sebastian, Arun Raj Kumar P.
Method and System for Protection of Automated Control Systems for "Smart Buildings"
Dmitry Mikhaylov, Igor Zhukov, Andrey Starikovskiy, Alexander Zuykov, Anastasia Tolstaya, Maxim Fomin
A Genetic Algorithm Inspired Load Balancing Protocol for Congestion Control in Wireless Sensor Networks using Trust Based Routing Framework (GACCTR)
Arnab Raha, Mrinal Kanti Naskar, Avishek Paul, Arpita Chakraborty, Anupam Karmakar
Analysis of Reconfigurable Processors Using Petri Net
Hadis Heidari
Video Forensics in Temporal Domain using Machine Learning Techniques
Sunil Jaiswal, Sunita Dhavale
Security Algorithms for Mitigating Selfish and Shared Root Node Attacks in MANETs
J.Sengathir, R.Manoharan
Dynamic Model on the Transmission of Malicious Codes in Network
Bimal Kumar Mishra, Apeksha Prajapati
Performance Improvement of Cache Management In Cluster Based MANET
Abdulaziz Zam, N. Movahedinia
Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing
Zeinab Latifi, Kamal Jamshidi, Ali Bohlooli
Biometric based Security Solutions for MANET: A Review
Ajay Jangra, Shivi Goel
Intelligent Routing using Ant Algorithms for Wireless Ad Hoc Networks
S. Menaka, M.K. Jayanthi
LPA 2D-DOA Estimation for Fast Nonstationary Sources Using New Array Geometry Configuration
AmiraAshour, Yasser Albagory
Time Window Management for Alert Correlation using Context Information and Classification
Mehdi Bateni, Ahmad Baraani
Study of ANN Configuration on Performance of Smart MIMO Channel Estimation for Downlink LTE-Advanced System
Nirmalkumar S. Reshamwala, Pooja S. Suratia, Satish K. Shah
Optimization of Routing in Distributed Sensor Networks Using Heuristic Technique Approach
Lokesh. B. Bhajantri, Nalini. N
A New Model for Intrusion Detection based on Reduced Error Pruning Technique
Mradul Dhakar, Akhilesh Tiwari
Context-Sensitive Access Control Policy Evaluation and Enforcement Using Vulnerability Exploitation Data
Hassan Rasheed
Priority Metric based Ad Hoc Routing for Underwater Sensor Network
Md. Ashraf Uddin, Md. Mamun-or-Rashid, Md. MustafizurRahman
A New Distributed and Power-Efficient Topology Control Algorithm for Wireless Ad-Hoc Networks
Saeid Taghavi Afshord, Bager Zarei, Bahman Arasteh
Fuzzy Membership Function in a Trust Based AODV for MANET
Partha Sarathi Banerjee, J. Paulchoudhury, S. R. Bhadra Chaudhuri
Performance Evaluation of AODV under Blackhole Attack
Tarunpreet Bhatia, A.K. Verma
On Maxima Distribution of Full Differentials and Linear Hulls of Block Symmetric Ciphers
Lisitskiy K.E.
Distributed Traffic Balancing Routing for LEO Satellite Networks
Yong Lu, Fuchun Sun, Youjian Zhao, Hongbo Li, Heyu Liu