Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
An Efficiency and Algorithm Detection for Stenography in Digital Symbols
Takialddin A. Al Smadi, Mohammed Maitah
A Heuristic Approach for Multicast Traffic Grooming in Optical WDM Mesh Networks
Ashok Kumar Pradhan, Subhendu Barat, Tanmay De
Auto-Pattern Programmable Kernel Filter (Auto-PPKF) for Suppression of Bot Generated Traffic
Kritika Govind, S. Selvakumar
A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP)
Sabyasachi Samanta, Saurabh Dutta, Goutam Sanyal
Towards Performance Evaluation of Cognitive Radio Network in Realistic Environment
Vivek Kukreja, Shailender Gupta, Bharat Bhushan, Chander Kumar
Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model
Liying Zhang, Lun Xie, Weize Li, Zhiliang Wang
An Improved Non-Repudiate Scheme-Feature Marking Voice Signal Communication
Remya A R, A Sreekumar, Supriya M H, Tibin Thomas
AWireless Local Area Network Soft Cell Phone (SCP) System with Multimedia and Data Services
Olakanmi O.Oladayo
Scheduling in Grid Systems using Ant Colony Algorithm
Saeed Molaiy, Mehdi Effatparvar
Enhancing QoS Through Dynamic and Fare AP Selection in a Wireless LAN
Fakhar Uddin Ahmed, Shikhar Kumar Sarma
Implementation of Enhanced Security Algorithms in Mobile Ad hoc Networks
M.Madhurya, B.Ananda Krishna, T.Subhashini
Minimization of Power Consumption in Mobile Adhoc Networks
B.Ruxanayasmin, B.Ananda Krishna, T.Subhashini
Hybrid Intrusion Detection Using Ensemble of Classification Methods
M.Govindarajan
An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding
Aarti, Pushpendra K Rajput
Artificial Neural Network trained by Genetic Algorithm for Smart MIMO Channel Estimation for Downlink LTE-Advance System
Nirmalkumar S. Reshamwala, Pooja S. Suratia, Satish K. Shah
Modeling GSM Based Network Communication in Vehicular Network
M. Milton Joe, B. Ramakrishnan, R. S. Shaji
Energy Scavenging Technology and Components in WSN
Sutapa Sarkar, Hameem Shanavas .I, Bhavani V
Classification via Clustering for Anonymization Data
Sridhar Mandapati, Raveendra Babu Bhogapathi, M.V.P.C.Sekhara Rao
Research on Application of Perceived QoS Guarantee through Infrastructure Specific Traffic Parameter Optimization
Vikram Jeet Singh, Vikram Kumar, Kishori Lal Bansal
Interoperability Framework for Vehicular Connectivity in Advanced Heterogeneous Vehicular Network
Saied M. Abd El-atty, Konstantinos Lizos
Modeling and Verification of 802.16 MAC Protocol using Higher-Order Petri Nets
Ali Mohammed Meligy, Hani Mohammed Ibrahim, Amal Mohammed Aqlan
A Comparative Study of Key Management Protocols for WSN
Seema Verma, Prachi
Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme
Raman Kumar
CBC and Interleaved CBC Implementations of PACTS Cryptographic Algorithm
J. John Raybin Jose, E. George Dharma Prakash Raj
Optimizing Concentric Circular Antenna Arrays for High-Altitude Platforms Wireless Sensor Networks
Yasser Albagory, Omar Said
BDCC: Backpressure routing and dynamic prioritization for congestion control in WMSNs
Akbar MAJIDI, Hamid MIRVAZIRI
A Comparative Survey on Optical Burst Switched Network Simulators
Terrance Frederick Fernandez, T. Megala, N.Sreenath
RSUs Deployment Using Parallel Scheduling
Ramneek kaur
A Hill Cipher Modification Based on Eigenvalues Extension with Dynamic Key Size HCM-EXDKS
Ahmed Y. Mahmoud, Alexander G. Chefranov
Energy Conservation for Ad Hoc On-Demand Distance Vector Multipath Routing Protocol
Omar Smail, Zoulikha Mekkakia, Belhadri Messabih, Rachida Mekki, Bernard Cousin
GAFBone: A New Backbone Construction for Increasing Lifetime in Wireless Sensor Networks
Leily A.Bakhtiar, Somayyeh Jafarali Jassbi
Secure and Fast Chaos based Encryption System using Digital Logic Circuit
Ankur A. Khare, Piyush B. Shukla, Sanjay C. Silakari
A Detailed Analysis of Grain family of Stream Ciphers
Mohammad Ubaidullah Bokhar, Shadab Alam, Syed Hamid Hasan
The Rating Mechanism for the Trusted Relationship Establishment for the Security of the Distributed Computer Systems
Vadym Mukhin
Forward Error Correction Convolutional Codes for RTAs' Networks: An Overview
Salehe I. Mrutu, Anael Sam, Nerey H. Mvungi
Mobility Based Cluster Head Selection Algorithm for Mobile Ad-Hoc Network
Soumyabrata Talapatra, Alak Roy
Task Assignment for Heterogeneous Computing Problems using Improved Iterated Greedy Algorithm
R.Mohan, N.P.Gopalan
Handover Analysis for Yaw-Shifted High-Altitude Platforms
Yasser Albagory
Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks
Abdoulaye Diop, Yue Qi, Qin Wang
A Generic Middleware Model for Smart Home
Madhusudanan J., Hariharan S., Manian A. Selvan, V. Prasanna Venkatesan