Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9

Научные статьи

В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Formal Verification of Congestion Control Algorithm in VANETs
Mohamad Yusof Darus, Kamalrulnizam Abu Bakar
Optimizing the CMTS to Improve Quality of Service in Next Generation Networks based on ACO Algorithm
Dac-Nhuong Le
QoS Enabled Probabilistic Routing for Heterogeneous Wireless Sensor Networks
Sanjay Kumar, Mayank Dave, Surender Dahiya
A Study on Contributory Group Key Agreements for Mobile Ad Hoc Networks
CH. V. Raghavendran, G. Naga Satish, P. Suresh Varma
A Robust Fault Detection Scheme for the Advanced Encryption Standard
Hassen Mestiri, Noura Benhadjyoussef, Mohsen Machhout, Rached Tourki
Adaptive Population Sizing Genetic Algorithm Assisted Maximum Likelihood Detection of OFDM Symbols in the Presence of Nonlinear Distortions
K. Seshadri Sastry, M.S.Prasad Babu
Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP
Mehajabeen Fatima, Roopam Gupta, T.K.Bandhopadhyay
Mobile Localization Based on Clustering
Malika BELKADI, Rachida AOUDJIT, Mehammed DAOUI, Mustapha LALAM
Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing
Zeinab Latifi, Kamal Jamshidi, Ali Bohlooli
Time Window Management for Alert Correlation using Context Information and Classification
Mehdi Bateni, Ahmad Baraani
Resource Provisioning for Routing with Priorities
Subarno Banerjee, Supriya Roy, P. K. Guha Thakurta
Study and Analysis of Text Steganography Tools
Indradip Banerjee, Souvik Bhattacharyya, Gautam Sanyal
An Efficiency and Algorithm Detection for Stenography in Digital Symbols
Takialddin A. Al Smadi, Mohammed Maitah
A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP)
Sabyasachi Samanta, Saurabh Dutta, Goutam Sanyal
Scheduling in Grid Systems using Ant Colony Algorithm
Saeed Molaiy, Mehdi Effatparvar
Hybrid Intrusion Detection Using Ensemble of Classification Methods
M.Govindarajan
An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding
Aarti, Pushpendra K Rajput
Energy Scavenging Technology and Components in WSN
Sutapa Sarkar, Hameem Shanavas .I, Bhavani V
Interoperability Framework for Vehicular Connectivity in Advanced Heterogeneous Vehicular Network
Saied M. Abd El-atty, Konstantinos Lizos
Modeling and Verification of 802.16 MAC Protocol using Higher-Order Petri Nets
Ali Mohammed Meligy, Hani Mohammed Ibrahim, Amal Mohammed Aqlan
A Comparative Study of Key Management Protocols for WSN
Seema Verma, Prachi
Visualization of Influencing Nodes in Online Social Networks
Prajit Limsaiprom, Prasong Praneetpolgrang, Pilastpongs Subsermsri
A Hill Cipher Modification Based on Eigenvalues Extension with Dynamic Key Size HCM-EXDKS
Ahmed Y. Mahmoud, Alexander G. Chefranov
Improved Anonymization Algorithms for Hiding Sensitive Information in Hybrid Information System
Geetha Mary A, D.P. Acharjya, N. Ch. S. N. Iyengar
Scrum and Temporal Distance-Based Global Software Development
Asmaa Fowzi Alotaibi, M. Rizwan Jameel Qureshi
ECCO Mnemonic Authentication—Two-Factor Authentication Method with Ease-of-Use
Saman Gerami Moghaddam, Amin Nasiri, Mohsen Sharifi
Task Assignment for Heterogeneous Computing Problems using Improved Iterated Greedy Algorithm
R.Mohan, N.P.Gopalan
Feature Selection for Modeling Intrusion Detection
Virendra Barot, Sameer Singh Chauhan, Bhavesh Patel
Optimal Route Based Advanced Algorithm using Hot Link Split Multi-Path Routing Algorithm
Akhilesh A. Waoo, Sanjay Sharma, Manjhari Jain
Integrity Analysis of Multimedia File Transmission between Mobile Phones
Sweta Deana Bye. Dhondoo, Vidasha. Ramnarain-Seetohul, Razvi. Doomun
Enhanced Intrusion Detection System for Malicious Node Detection in Mobile Ad hoc Networks using Data Transmission Quality of Nodes
S. Mamatha, A. Damodaram
Trust Metric based Soft Security in Mobile Pervasive Environment
Madhu Sharma Gaur, Bhaskar Pant
A Preliminary Study of Fake Fingerprints
Qinghai Gao
Communication Centrality in Dynamic Networks Using Time-Ordered Weighted Graph
Ali M. Meligy, Hani M. Ibrahem, Ebtesam A. Othman
An Architecture for Alert Correlation Inspired By a Comprehensive Model of Human Immune System
Mehdi Bateni, Ahmad Baraani
An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis
Alaa I. Elnashar, Said F. El-Zoghdy
Design of a Web Interface for Fractional Chaotic Systems
Sezgin Kaçar, Akif Akgül, A. Turan Ergüzel, Muhammed M. Öztürk, Abdullah Sevin
Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption
Saddaf Rubab, Younus Javed
Extending the WSN lifetime by Dividing the Network Area into a Specific Zones
Mishall H. Awaad, Wid A. Jebbar
Augmented Reality Mobile Application of Balinese Hindu Temples: DewataAR
Adi Ferliyanto Waruwu, I Putu Agung Bayupati, I Ketut Gede Darma Putra