Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Detection of Wormhole, Blackhole and DDOS Attack in MANET using Trust Estimation under Fuzzy Logic Methodology
Ashish Kumar Khare, J. L. Rana, R. C. Jain
Comparative Performance Analysis between nRF24L01+ and XBEE ZB Module Based Wireless Ad-hoc Networks
Himadrinath Saha, Shashwata Mandal, Shinjan Mitra, Soham Banerjee, Urmi Saha
K-MLP Based Classifier for Discernment of Gratuitous Mails using N-Gram Filtration
Harjot Kaur, Er. Prince Verma
Reciprocity based Energy Efficient Cooperative Routing Protocol for WSNs
Prasanna Shete, R. N. Awale
On Classical Cryptographic Protocols in Post-Quantum World
István Vajda
Frog-Based Routing Algorithm to Enhance the Network Lifetime of Wireless Sensor Networks
Vidya Honguntikar, G. S. Biradar
Heuristic Algorithms for Task Scheduling in Cloud Computing: A Survey
Nasim Soltani, Behzad Soleimani, Behrang Barekatain
Mutual Authentication and Session Key Establishment for Secure Communication using Generalized Digital Certificate
Balaji V Durgawad, Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdul Sattar
A Partial Ordered Number System for Information Flow Control
Shih-Chien Chou
Location Privacy using Homomorphic Encryption over Cloud
Alisha Rohilla, Mehak Khurana, Latika Singh
Detecting Pirated Movie’s with Similarity Assessment Based on Earth Mover’s Distance
Srinivas Baggam, K.Venkata Rao, P. Suresh Varma
CVSHR: Enchantment Cloud-based Video Streaming using the Heterogeneous Resource Allocation
Mohamed A. Elsharkawey, Hosam E. Refaat
Supervised Optimization of Fuel Ratio in IC Engine Based on Design Baseline Computed Fuel Methodology
Farzin Piltan, Saeed Zare, Fatemeh ShahryarZadeh, Mohammad Mansoorzadeh, Marzieh kamgari
Towards Modeling Malicious Agents in Decentralized Wireless Sensor Networks: A Case of Vertical Worm Transmissions and Containment
ChukwuNonso H. Nwokoye, Virginia E. Ejiofor, Moses O. Onyesolu, Boniface Ekechukwu
Performance Evaluation of Authentication-Encryption and Confidentiality Block Cipher Modes of Operation on Digital Image
Narges Mehran, Mohammad Reza Khayyambashi
VisiMark1_0: An Assistance Tool for Evaluating Robustness of Video Watermarking Algorithms
Neeta Deshpande, Mahesh Sanghavi, Archana Rajurkar, Ramchandra Manthalkar
Video Steganography: Secure Data Hiding Technique
Gat Pooja Rajkumar, V. S. Malemath
iText – SMS-based Web Services for Low-end Cell Phones
Juan Li, Justin Anderson, Matti Kariluoma, Kailash Joshi, Prateek Rajan, Pubudu Wijeyaratne
New Design of Tiny-Block Hybridization in AES
Ritu Goyal, Mehak Khurana
Pseudo Random Ternary Sequence and Its Autocorrelation Property Over Finite Field
Md. Arshad Ali, Emran Ali, Md. Ahsan Habib, Md. Nadim, Takuya Kusaka, Yasuyuki Nogami
A New Technique for Segmentation of Handwritten Numerical Strings of Bangla Language
Md. Aktaruzzaman, Md. Farukuzzaman Khan, Ahsan-Ul-Ambia
Performance Evaluation of the Loop Buffer Switch under Prioritized Traffic
Devesh Pratap Singh, Rajiv Srivastava
Ultrasound Image Despeckling using Local Binary Pattern Weighted Linear Filtering
Simily Joseph, Kannan Balakrishnan, M.R. Balachandran Nair, Reji Rajan Varghese
Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops
Shahram Behzad, Reza Fotohi, Shahram Jamali
Secured and Optimized AODV for Wireless Sensor Networks
Benamar KADRI, Mohammed FEHAM, AbdellahMHAMMED
Intelligent Vision Methodology for Detection of the Cutting Tool Breakage
Abdallah A. Alshennawy, Ayman A. Aly
The Major Physical Layer Constraints of Fiber Optical fiber Packet Switch Architectures
Devesh Pratap Singh
Secure and Optimized Authentication Scheme in Proxy Mobile IPv6 (SOAS-PMIPv6) to reduce Handover Latency
Arun Kumar Tripathi, J. S. Lather, R. Radhakrishnan
Multi-dimensional Range Query on Outsourced Database with Strong Privacy Guarantee
Do Hoang Giang, Ng Wee Keong
An Efficient IBE Scheme using IFP and DDLP
Chandrashekhar Meshram
Performance Analysis of MANET Routing Protocols in Different Mobility Models
Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma
Digital IIR Filter Design using Real Coded Genetic Algorithm
Ranjit Kaur, Manjeet Singh Patterh, J.S. Dhillon
An Efficient Graph-Coloring Algorithm for Processor Allocation
Mohammed Hasan Mahafzah
Clustering Based on Node Density in Heterogeneous Under-Water Sensor Network
Sharad Saxena, Shailendra Mishra, Mayank Singh
A New Method to Improve Round Robin Scheduling Algorithm with Quantum Time Based on Harmonic-Arithmetic Mean (HARM)
Ashkan Emami Ale Agha, Somayyeh Jafarali Jassbi
Some Algebraic Properties of Multigranulations and an Analysis of Multigranular Approximations of Classifications
B.K.Tripathy, R.Raghavan
An Analytical Review of Stereovision Techniques to Reconstruct 3D Coordinates
Raheel Ahmed, Muhammad Naeem Ahmed Khan
Stable Fuzzy PD Control with Parallel Sliding Mode Compensation with Application to Rigid Manipulator
Farzin Piltan, Mohammad A. Bairami, Farid Aghayari, Mohammad Reza Rashidian
Design and Implementation of a Security Scheme for Detecting System Vulnerabilities
Sonali Sharma, Shilpa Mahajan
Empirical Study of an Improved Component Based Software Development Model using Expert Opinion Technique
Asif Irshad Khan, Md. Mottahir Alam, Noor-ul-Qayyum, Usman Ali Khan