Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers
G. Ramesh, R. Umarani
Efficient Networks Communication Routing Using Swarm Intelligence
Koushal Kumar
Real Time Handwritten Marathi Numerals Recognition Using Neural Network
Sandeep B. Patil, G.R. Sinha
Fault Tolerant Message Efficient Coordinator Election Algorithm in High Traffic Bidirectional Ring Network
Danial Rahdari, Amir Masoud Rahmani, Afsane Arabshahi
Improved Anti-Collision Algorithm for Tag Identification in Future Internet of Things
Mahmoud Moshref
A Survey of Applications and Security Issues in Software Defined Networking
Azka, S Revathi, Angelina Geetha
Design and Implementation of Secure Building Monitoring System using Programmable Wireless Mobile Camera
Baidaa A. Atya, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen
Distributed Defense: An Edge over Centralized Defense against DDos Attacks
Karanbir Singh, Kanwalvir Singh Dhindsa, Bharat Bhushan
Self-organized Detection of Relationships in a Network
P.Lokesh Kumar Reddy, B.Rama Bhupal Reddy, S.Rama Krishna
Evaluation of Secure Cloud Transmission Protocol
Dinesha H.A, D.H.Rao
Anomaly Detection System in Secure Cloud Computing Environment
Zhengbing Hu, Sergiy Gnatyuk, Oksana Koval, Viktor Gnatyuk, Serhii Bondarovets
A Mobile-Based Computer Controller via Android Technology
Siew-Chin Chong, Lee-Ying Chong, Stephanie Bosede Ajiroba
New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher
Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen
Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies
Tousif ur Rehman, Muhammad Naeem Ahmed Khan, Naveed Riaz
A Survey on Graph Queries Processing: Techniques and Methods
Hamed Dinari
A Novel and Efficient Method for Protecting Internet Usage from Unauthorized Access Using Map Reduce
P. Srinivasa Rao, K. Thammi Reddy, MHM. Krishna Prasad
Internet of Things: A Review on Technologies, Architecture, Challenges, Applications, Future Trends
Jaideep Kaur, Kamaljit Kaur
SCXTREME Framework: A Customized Approach of Process Improvements in Agile Blend with CMMI Practices in Pakistan
Samina Jan, Ali Javed
Enhancing Software Reliability against Soft-Error using Minimum Redundancy on Critical Data
Saeid A. Keshtgar, Bahman B. Arasteh
PEECA: PSO-Based Energy Efficient Clustering Algorithm for Wireless Sensor Networks
Santar Pal Singh, Subhash Chander Sharma
A Method for Verifiable Secret Image Sharing
Priya Venny, Jyoti Rao
Homomorphic Cryptosystem
Alisha Rohilla, Mehak Khurana, Meena Kumari
Cost-Aware Task Scheduling in Cloud Computing Environment
Mokhtar A. Alworafi, Atyaf Dhari, Asma A. Al-Hashmi, Suresha, A. Basit Darem
On a Novel Grid Computing-Based Distributed Brute-force Attack Scheme (GCDBF) By Exploiting Botnets
Mohammad Reza. Hasani Ahangar, Mohammad Reza. Esmaeili Taba, Arash.Ghafouri
Method for Cyberincidents Network-Centric Monitoring in Critical Information Infrastructure
Zhengbing Hu, Viktor Gnatyuk, Viktoriia Sydorenko, Roman Odarchenko, Sergiy Gnatyuk
A Hybrid Cryptographic Model for Data Storage in Mobile Cloud Computing
Oladeji P. Akomolafe, Matthew O. Abodunrin
Analysis of QoS in Software Defined Wireless Network with Spanning Tree Protocol
Rafid Mustafiz, Abu Sayem Mohammad Delowar Hossain, Nazrul Islam, Mohammad Motiur Rahman
Malware-Free Intrusions: Exploitation of Built-in Pre-Authentication Services for APT Attack Vectors
Aaron Zimba, Zhaoshun Wang
Trust Establishment in SDN: Controller and Applications
Bassey Isong, Tebogo Kgogo, Francis Lugayizi
Detection of Wormhole, Blackhole and DDOS Attack in MANET using Trust Estimation under Fuzzy Logic Methodology
Ashish Kumar Khare, J. L. Rana, R. C. Jain
K-MLP Based Classifier for Discernment of Gratuitous Mails using N-Gram Filtration
Harjot Kaur, Er. Prince Verma
Heuristic Algorithms for Task Scheduling in Cloud Computing: A Survey
Nasim Soltani, Behzad Soleimani, Behrang Barekatain
A Partial Ordered Number System for Information Flow Control
Shih-Chien Chou
Evaluation of Hidden Semi-Markov Models Training Methods for Greek Emotional Text-to-Speech Synthesis
Alexandros Lazaridis, Iosif Mporas
Location Privacy using Homomorphic Encryption over Cloud
Alisha Rohilla, Mehak Khurana, Latika Singh
Handover Comparisons of WiMAX and WiMAX Release 2
Ali Sufyan, Yasir Salam, Sundas Amin
Distributed Malware Detection Algorithm (DMDA)
Aiman A. Abu Samra, Hasan N. Qunoo, Alaa M. Al Salehi
Performance Evaluation of Index Schemes for Semantic Cache
Sheneela Naz, Muhammad Naeem, Amir Qayyum
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
Nashaat el-Khameesy, Hossam Abdel Rahman Mohamed
Performance Evaluation of I.T Project Management in Developing Countries
Nadeem Majeed, Khurram Ali Shah, Khurram Ashfaq Qazi, Muazzam Maqsood