Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9

Научные статьи

В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Searching Methods of MP2P Based on Diffusion Strategy of Resources Index
A public opinion classification algorithm based on micro-blog text sentiment intensity: Design and implementation
Particle Swarm Optimization for Multi-constrained Routing in Telecommunication Networks
Identity Authentication and Context Privacy Preservation in Wireless Health Monitoring System
On the Performance of Priority-Based Virtual Channels Scheduling Algorithm in Packet Telemetry System
M2KMIX: Identifying the Type of High Rate Flooding Attacks using a Mixture of Expert Systems
Optimization Modeling for GM(1,1) Model Based on BP Neural Network
Enhancing Hash Function Selection Techniques Based on Message Contents
Achieving Open-loop Insulin Delivery using ITM Designed for T1DM Patients
Improved Multi-Path and Multi-Speed Routing Protocol in Wireless Sensor Networks
Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms
Distributed Algorithms for Improving Search Efficiency in P2P Overlays
Fast Vertical Handover Algorithm for Vehicular Communication: A Holistic Approach
Network Packet Inspection to Identify Contraband File Sharing Using Forensic Tools
Attacks Due to Flaw of Protocols Used In Network Access Control (NAC), Their Solutions and Issues: A Survey
Very Large Scale Optical Interconnect Systems For Different Types of Optical Interconnection Networks
Digital Forensic Investigation Tools and Procedures
Asymptotic Stability Analysis of E-speed Start Congestion Control Protocol for TCP
A Hierarchical Load Balancing Policy for Grid Computing Environment
Congestion Control in 4G Wireless Networks Using Coalition Game
An Analytical Assessment on Document Clustering
Toward Security Test Automation for Event Driven GUI Web Contents
Application of Biometrics in Mobile Voting
Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System
Mining Data Streams using Option Trees
Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition
Computation of Pheromone Values in AntNet Algorithm
Importance of S-Blocks in Modern Block Ciphers
Constraint Based Periodicity Mining in Time Series Databases
A Survey: Recent Advances and Future Trends in Honeypot Research
Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework
Performance Analysis of Black Hole Attack in Vanet
A New 512 Bit Cipher for Secure Communication
Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition
Text Steganography Using Quantum Approach in Regional Language with Revised SSCE
Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks
Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks
Digital Image Scrambling Based on Two Dimensional Cellular Automata
Formal Verification of Congestion Control Algorithm in VANETs
Optimizing the CMTS to Improve Quality of Service in Next Generation Networks based on ACO Algorithm