Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
SysProp: A Web-based Data Backup, Synchronization and System Administration
Salekul Islam, Mohammad Amanul Islam
Direction-of-Arrival Estimation for Stratospheric Platforms Mobile Stations
Yasser Albagory
Integrity Analysis of Multimedia File Transmission between Mobile Phones
Sweta Deana Bye. Dhondoo, Vidasha. Ramnarain-Seetohul, Razvi. Doomun
Congestion Control in WMSNs by Reducing Congestion and Free Resources to Set Accurate Rates and Priority
Akbar Majidi, Hamid Mirvaziri
C2DF: High Rate DDOS filtering method in Cloud Computing
Pourya Shamsolmoali, M.Afshar Alam, Ranjit Biswas
Artificial Intrusion Detection Techniques: A Survey
Ashutosh Gupta, Bhoopesh Singh Bhati, Vishal Jain
Hybrid Encryption-Compression Scheme Based on Multiple Parameter Discrete Fractional Fourier Transform with Eigen Vector Decomposition Algorithm
Deepak Sharma, Rajiv Saxena, Narendra Singh
Distributed Monitoring for Wireless Sensor Networks: a Multi-Agent Approach
Bechar Rachid, Haffaf Hafid
Ternary Tree Based Group Key Agreement for Cognitive Radio MANETs
N. Renugadevi, C. Mala
Enhanced Intrusion Detection System for Malicious Node Detection in Mobile Ad hoc Networks using Data Transmission Quality of Nodes
S. Mamatha, A. Damodaram
Efficient Clustering Technique for Cooperative Wireless Sensor Network
Kaushlendra Kumar Pandey, Neetesh Purohit, Ajay Agarwal
Hardware Realization of Fast Multi-Scalar Elliptic Curve Point Multiplication by Reducing the Hamming Weights Over GF(p)
Nagaraja Shylashree, Venugopalachar Sridhar
Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter human Biometric Authentication System
Subrata Nandi, Satyabrata Roy, Jayanti Dansana, Wahiba Ben Abdessalem Karaa, Ruben Ray, Shatadru Roy Chowdhury, Sayan Chakraborty, Nilanjan Dey
Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network
Bhavana Butani, Piyush Kumar Shukla, Sanjay Silakari
HTTP Packet Inspection Policy for Improvising Internal Network Security
Kuldeep Tomar, S.S. Tyagi
VoIP Performance Analysis over IPv4 and IPv6
Monjur Ahmed, Alan T Litchfield, Shakil Ahmed, Adnan Mahmood, Md. Emran Hossain Meazi
Detection Block Model for SQL Injection Attacks
Diksha G. Kumar, Madhumita Chatterjee
A Preliminary Study of Fake Fingerprints
Qinghai Gao
A Comprehensive Analysis of Android Security and Proposed Solutions
Asim S. Yuksel, Abdul H. Zaim, Muhammed A. Aydin
Communication Centrality in Dynamic Networks Using Time-Ordered Weighted Graph
Ali M. Meligy, Hani M. Ibrahem, Ebtesam A. Othman
A New Pluggable Framework for Centralized Routing in Wireless Sensor Network
Amir Mollanejad, Amir Azimi Alasti Ahrabi, Hadi Bahrbegi, Leyli Mohammad Khanli
Genetic Algorithm Based Node Fault Detection and Recovery in Distributed Sensor Networks
Lokesh B. Bhajantri, Nalini. N
3-Level DWT Image Watermarking Against Frequency and Geometrical Attacks
Asma Ahmad, G.R.Sinha, Nikita Kashyap
A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET
Sherin Zafar, M K Soni
An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis
Alaa I. Elnashar, Said F. El-Zoghdy
A Light-weight Symmetric Encryption Algorithm Based on Feistel Cryptosystem Structure
Jingli Zheng, Zhengbing Hu, Chuiwei Lu
Mean Response Time Approximation for HTTP Transactions over Transport Protocols
Y. –J. Lee
An Improvement over a Server-less‎ RFID Authentication Protocol
Mohsen Pourpouneh, Rasoul Ramezanian, Fatemeh Salahi
Performance Evaluation of Distributed Protocols Using Different Levels of Heterogeneity Models in Wireless Sensor Networks
Samayveer Singh, Satish Chand, Bijendra Kumar
Analysis and Comparison of Access Control Policies Validation Mechanisms
Muhammad Aqib, Riaz Ahmed Shaikh
LEFT: A Latency and Energy Efficient Flexible TDMA Protocol for Wireless Sensor Networks
Sachin Gajjar, Nilav Choksi, Mohanchur Sarkar, Kankar Dasgupta
Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption
Saddaf Rubab, Younus Javed
Extending the WSN lifetime by Dividing the Network Area into a Specific Zones
Mishall H. Awaad, Wid A. Jebbar
A Scalable Wireless Sensor Network (WSN) Based Architecture for Fire Disaster Monitoring in the Developing World
Emmanuel Lule, Tonny Eddie Bulega
Multipath Data Transmission with minimization of Congestion Using Ant Colony Optimization for MTSP and Total Queue Length
Dhriti Sundar Maity, Subhrananda Goswami
Effective Hybrid Intrusion Detection System: A Layered Approach
Abebe Tesfahun, D. Lalitha Bhaskari
A Novel Approach of Image Based Steganography Using Pseudorandom Sequence Generator Function and DCT Coefficients
Anupam Mondal, Shiladitya Pujari
Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count
Md. Ibrahim Abdullah, Mohammad Muntasir Rahman, Mukul Chandra Roy
Server-Side Encrypting and Digital Signature Platform with Biometric Authorization
Leszek Siwik, Lukasz Mozgowoj
Innovative Method for Enhancing Key Generation and Management in the AES-Algorithm
Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem