Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9

Научные статьи

В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Research on Trusted Industrial Control Ethernet Network
ZHOU Sen-xin, HAN Jiang-hong, TANG Hao
Cross Layer Transmission for AOS Packet Service
Bi Mingxue
Searching Methods of MP2P Based on Diffusion Strategy of Resources Index
Fangfang Guo, Jing Xu
A public opinion classification algorithm based on micro-blog text sentiment intensity: Design and implementation
Xin Mingjun, Wu Hanxiang, Li Weimin, Niu Zhihua
Particle Swarm Optimization for Multi-constrained Routing in Telecommunication Networks
Hongyan Cui, Jian Li, Xiang Liu, Yunlong Cai
Identity Authentication and Context Privacy Preservation in Wireless Health Monitoring System
Qiming Huang, Xing Yang, Shuang Li
On the Performance of Priority-Based Virtual Channels Scheduling Algorithm in Packet Telemetry System
TIAN Ye, ZHANG Yan-qin, ZHANG Zi-jing
M2KMIX: Identifying the Type of High Rate Flooding Attacks using a Mixture of Expert Systems
Arun Raj Kumar P., S. Selvakumar
Optimization Modeling for GM(1,1) Model Based on BP Neural Network
Deqiang Zhou
Enhancing Hash Function Selection Techniques Based on Message Contents
Ali Saeed, Muhammad Khalil Shahid
Achieving Open-loop Insulin Delivery using ITM Designed for T1DM Patients
Akash Rajak, Kanak Saxena
Improved Multi-Path and Multi-Speed Routing Protocol in Wireless Sensor Networks
S. Saqaeeyan, M. Roshanzadeh
Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms
M. Anand Kumar, S.Karthikeyan
Distributed Algorithms for Improving Search Efficiency in P2P Overlays
Chittaranjan Hota, Vikram Nunia, Antti Ylä-Jääski
Fast Vertical Handover Algorithm for Vehicular Communication: A Holistic Approach
Sourav Dhar, Shubhajit Datta, Rabindra Nath Bera, Amitava Ray
Network Packet Inspection to Identify Contraband File Sharing Using Forensic Tools
N.Kannaiya Raja, K.Arulanandam, R.Somasundaram
Attacks Due to Flaw of Protocols Used In Network Access Control (NAC), Their Solutions and Issues: A Survey
Snehasish Parhi
Very Large Scale Optical Interconnect Systems For Different Types of Optical Interconnection Networks
Ahmed Nabih Zaki Rashed
Digital Forensic Investigation Tools and Procedures
K. K. Sindhu, B. B. Meshram
Asymptotic Stability Analysis of E-speed Start Congestion Control Protocol for TCP
Oyeyinka I.K., Akinwale A.T., Folorunso O., Olowofela J.A., Oluwatope A.
A Hierarchical Load Balancing Policy for Grid Computing Environment
Said Fathy El-Zoghdy
Congestion Control in 4G Wireless Networks Using Coalition Game
S. V. Saboji, C. B. Akki
An Analytical Assessment on Document Clustering
Pushplata, Ram Chatterjee
Toward Security Test Automation for Event Driven GUI Web Contents
Izzat Alsmadi, Ahmed AlEroud
Application of Biometrics in Mobile Voting
Donovan Gentles, Suresh Sankaranarayanan
Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System
Jashan Koshal, Monark Bag
Mining Data Streams using Option Trees
B.Reshma Yusuf, P.Chenna Reddy
Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition
V.K. NARENDIRA KUMAR, B. SRINIVASAN
Computation of Pheromone Values in AntNet Algorithm
Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma
Importance of S-Blocks in Modern Block Ciphers
Lisitskaya I.V., Melnychuk E.D., Lisitskiy K.E.
Constraint Based Periodicity Mining in Time Series Databases
Ramachandra.V.Pujeri, G.M.Karthik
A Survey: Recent Advances and Future Trends in Honeypot Research
Matthew L. Bringer, Christopher A. Chelmecki, Hiroshi Fujinoki
Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework
Irshad Ahmad Mir, S.M.K Quadri
Performance Analysis of Black Hole Attack in Vanet
Vimal Bibhu, Kumar Roshan, Kumar Balwant Singh, Dhirendra Kumar Singh
A New 512 Bit Cipher for Secure Communication
M. Anand Kumar, S.Karthikeyan
Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition
Harminder Singh Bindra, A L Sangal
Text Steganography Using Quantum Approach in Regional Language with Revised SSCE
Indradip Banerjee, Souvik Bhattacharyya, Gautam Sanyal
Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks
IBalasaheb N. Jagdale, Nileema S. Gawande
Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks
P.Periyasamy, E.Karthikeyan
Digital Image Scrambling Based on Two Dimensional Cellular Automata
Fasel Qadir, M. A. Peer, K. A. Khan