Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
An Efficient Approach to Genetic Algorithm for Task Scheduling in Cloud Computing Environment
Shaminder Kaur, Amandeep Verma
Performance Analysis of 802.16 (WIMAX) Networks under Various Routing Protocols and Traffic Loads
Mohammad Rehan Rasheed, Ibrahim M. Hussain
Design and Development of a Simple Low-cost Touchscreen to Control Home Automation System
M. Muntasir Rahman, Md. Aktaruzzaman, Mst. Ashrafunnahar Hena
Using Web Services Standards for Dealing with Complexities of Multiple Incompatible Applications
Quist-Aphetsi Kester, Ghartey Nana Gyankumah, Ajibade Ibrahim Kayode
Artificial Bee Colony and Its Application for Image Fusion
Prabhat Kumar Sharma, Bhavya V S, Navyashree K M, Sunil K S, Pavithra P
Simulation and Tuning of PID Controllers using Evolutionary Algorithms
T. Lakshmi Priyanka, K.R.S. Narayanan, T.Jayanthi, S.A.V. Satya Murty
Prediction of Missing Values for Decision Attribute
T. Medhat
Analogue Wavelet Transform Based the Solution of the Parabolic Equation
Jean-Bosco Mugiraneza, Amritasu Sinha
A Proposed Virtualization Technique to Enhance IT Services
Nashaat el-Khameesy, Hossam Abdel Rahman Mohamed
Improvement in Quality of Software Architecture via Enhanced-Pattern Driven Architecture (EPDA)
Muhammad Fahad Khan, Kanwal Yousaf, Anam Mustaqeem, Muazaam Maqsood
Architecture Aware Key Management Scheme for Wireless Sensor Networks
Benamar KADRI, Mohammed FEHAM, Abdellah MHAMMED
Efficient Networks Communication Routing Using Swarm Intelligence
Koushal Kumar
Classification of SAR Images Based on Entropy
Debabrata Samanta, Goutam Sanyal
Interpretation of Normal and Pathological ECG Beats using Multiresolution Wavelet Analysis
Shubhada S.Ardhapurkar, Ramandra R. Manthalkar, Suhas S.Gajre
Fault Tolerant Message Efficient Coordinator Election Algorithm in High Traffic Bidirectional Ring Network
Danial Rahdari, Amir Masoud Rahmani, Afsane Arabshahi
Performance Evaluation of Mamdani-type and Sugeno-type Fuzzy Inference System Based Controllers for Computer Fan
Philip A. Adewuyi
Analysis and Ranking of Software Reliability Models Based on Weighted Criteria Value
Mohd. Anjum, Md. Asraful Haque, Nesar Ahmad
Efficient Dynamic Resource Allocation in OFDMA Systems by Firefly Pack Algorithm
Haider M. AlSabbagh, Mohammed Khalid Ibrahim
A Simple Statistical Model to Estimate Incident Solar Radiation at the Surface from NOAA AVHRR Satellite Data
Mst. Ashrafunnahar Hena, M. Shahjahan Ali, M. Muntasir Rahman
Improved Anti-Collision Algorithm for Tag Identification in Future Internet of Things
Mahmoud Moshref
A Survey of Applications and Security Issues in Software Defined Networking
Azka, S Revathi, Angelina Geetha
Design and Implementation of Secure Building Monitoring System using Programmable Wireless Mobile Camera
Baidaa A. Atya, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen
A Comparison Study on Selective Traffic Models with Handoff Management Scheme for Wireless Mobile Network Infrastructure
Biswajit Bhowmik
A Medical Image Watermarking Technique for Embedding EPR and Its Quality Assessment Using No-Reference Metrics
Rupinder Kaur
Fingerprints, Iris and DNA Features based Multimodal Systems: A Review
Prakash Chandra Srivastava, Anupam Agrawal, Kamta Nath Mishra, P. K. Ojha, R. Garg
Enhancing Quality of Service in Heterogeneous Wireless Network using EDLAS
Divya, Suman
Anomaly Detection System in Secure Cloud Computing Environment
Zhengbing Hu, Sergiy Gnatyuk, Oksana Koval, Viktor Gnatyuk, Serhii Bondarovets
A Survey of Catadioptric Omnidirectional Camera Calibration
Yan Zhang, Lina Zhao, Wanbao Hu
A Mobile-Based Computer Controller via Android Technology
Siew-Chin Chong, Lee-Ying Chong, Stephanie Bosede Ajiroba
Enhancing the Security in Cryptosystems Based on Magic Rectangle
Mani. K, Viswambari. M
Comparison of on Demand Routing Protocols
Bharat Bhushan, Shailender Gupta, C.K.Nagpal
Toward Constructing Cancellable Templates using K-Nearest Neighbour Method
Qinghai Gao
Internet Passport Authentication System Using Multiple Biometric Identification Technology
V.K. Narendira Kumar, B. Srinivasan
A Method for Verifiable Secret Image Sharing
Priya Venny, Jyoti Rao
Performance Evaluation of Unslotted CSMA/CA for Wireless Sensor Networks: Energy Consumption Analysis and Cross Layer Routing
Inès El Korbi, Leila Azouz Saïdane
Implementation of GSM Based Security System with IOT Applications
Seelam Vasavi Sai Viswanada Prabhu Deva Kumar, Shyam Akashe
On a Novel Grid Computing-Based Distributed Brute-force Attack Scheme (GCDBF) By Exploiting Botnets
Mohammad Reza. Hasani Ahangar, Mohammad Reza. Esmaeili Taba, Arash.Ghafouri
Investigation of LEACH Protocol and its Successors in WSN
Er. Kiranpreet kaur, Er. Ridhi Kapoor
Malware-Free Intrusions: Exploitation of Built-in Pre-Authentication Services for APT Attack Vectors
Aaron Zimba, Zhaoshun Wang
Performance Analysis of Rectangular and circular Shape Building Deployment for an Indoor Visible Light Communication System
Ram Sharma, A. Charan Kumari