Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Day-ahead Pricing Model for Smart Cloud using Time Dependent Pricing
Chetan Chawla, Inderveer Chana
Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks
Bindiya Bhatia, M.K.Soni, Parul Tomar
A Novel Approach for Optimization Auto-Scaling in Cloud Computing Environment
Khosro Mogouie, Mostafa Ghobaei Arani, Mahboubeh Shamsi
Multiple Information Hiding using Cubical Approach on Random Grids
Sandeep Gurung, Kritartha Paul Choudhury, Arindam Parmar, Kshitij Panghaal
Performance Evaluation of AODV and GOD for Qos Aware Applications through Realistic Conditions in VANET
Richa Sharma, Jyoteesh Malhotra
An Innovative Approach for Video Steganography
Koumal Kaushik, Suman
Performance Analysis of VOIP over GRE Tunnel
Aria. Asadi Eskandar, Mahbubur. R. Syed, Bahareh. Zarei.M
The New Block Cipher Design (Tigris Cipher)
Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohsen J. Abdul Hossen
Optimization of Value of Parameters in Ad-hoc on Demand Multipath Distance Vector Routing Using Magnetic Optimization Algorithm
A K Giri, D K Lobiyal, C P Katti
Quality Evaluation of Mobile Networks Using VoIP Applications: A Case Study with Skype and LINE based-on Stationary Tests in Bangkok
Pongpisit Wuttidittachotti, Therdpong Daengsi
Enhanced Voting based Secure Localization for Wireless Sensor Networks
M. B. Nirmala, A. S. Manjunatha
FPGA Implementation of Secure Force (64-Bit) Low Complexity Encryption Algorithm
Shujaat Khan, M. Sohail Ibrahim, Mansoor Ebrahim, Haseeb Amjad
Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System
Rajendra Gupta, Piyush Kumar Shukla
Secure Model for SMS Exchange over GSM
Mohammed Baqer M. Kamel, Loay E. George
Dynamic and Real-time Sleep Schedule Protocols for Energy Efficiency in WSNs
Kaebeh Yaeghoobi S.B., M.K. Soni, S.S. Tyagi
Energy Conscious based Multipath Routing Algorithm in WSN
K.Rajasekaran, Kannan Balasubramanian
Intrusion Detection with Multi-Connected Representation
Abdelkader Khobzaoui, Abderrahmane Yousfate
An Intrusion Detection and Prevention System based on Automatic Learning of Traffic Anomalies
Abdurrahman A. Nasr, Mohamed M. Ezz, Mohamed Z. Abdulmaged
Context-Sensitive Grammars and Linear-Bounded Automata
Prem Nath
Performance Evaluation of IPv4/IPv6 Transition Mechanisms
Adira Quintero, Francisco Sans, Eric Gamess
Taxonomy of SSL/TLS Attacks
Keerthi Vasan K., Arun Raj Kumar P.
Modified LEACH-DT Algorithm with Hierarchical Extension for Wireless Sensor Networks
Vrinda Gupta, Rajoo Pandey
CEAACK – A Reduced Acknowledgment for Better Data Transmission for MANETs
J.Sathiamoorthy, B.Ramakrishnan
Predict Link Failure in AODV Protocol to provide Quality of Service in MANET
Sedrati Maamar, Benyahia Abderezzak
Optimized Communication of Group Mobility in WPAN
Suman Lata, Naveen Goel
Buffering Strategies in Optical Packet Switching
Chitra Sharma, Akhilesh Kumar Yadav
Double Layer Image Security System using Encryption and Steganography
Samreen Sekhon Brar, Ajitpal Brar
Analysis of Cryptographic Protocols AKI, ARPKI and OPT using ProVerif and AVISPA
Amol H. Shinde, A. J. Umbarkar
A Stable Backbone-Based on Demand Multipath Routing Protocol for Wireless Mobile Ad Hoc Networks
Sujata V. Mallapur, Siddarama R. Patil, Jayashree V. Agarkhed
An Analysis of Link Disjoint and Node Disjoint Multipath Routing for Mobile Ad Hoc Network
Indrani Das, D.K. Lobiyal, C.P.Katti
A Throughput and Spectrum Aware Fuzzy Logic Based Routing Protocol for CRN
Poonam Mittal, Mehak Jain, C.K. Nagpal, Shailender Gupta
Low Complexity Multimedia Encryption
Karthik. Thiyagarajan, Kamal El-Sankary, Yongsheng Wang, Issam Hammad
Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform
Siddharth Singh, Tanveer J. Siddiqui
The Scalability and Stability Analysis of KLEACH Routing Protocol in Wireless Sensor Networks
Abdelkader Bourzek, Abderrahmane Hajraoui, Saad Chakkor, Mostafa Baghouri
Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks
Adwan Yasin, Salah Jabareen
Formal Verification of NTRUEncrypt Scheme
Gholam Reza Moghissi, Ali Payandeh
Efficient Scalar Multiplication over Elliptic Curve
Deepika Kamboj, D.K.Gupta, Amit Kumar
A Note on Group Authentication Schemes
Mohsen Pourpouneh, Rasoul Ramezanian, Afshin Zarei
Evaluation of Message Dissemination Techniques in Vehicular Ad Hoc Networks using Node Movement in Real Map
Sanjoy Das, D.K.Lobiyal
A Review on Multiple Survey Report of Cloud Adoption and its Major Barriers in the Perspective of Bangladesh
Md. Masudul Islam, Mijanur Rahaman