Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Towards Modeling Malicious Agents in Decentralized Wireless Sensor Networks: A Case of Vertical Worm Transmissions and Containment
ChukwuNonso H. Nwokoye, Virginia E. Ejiofor, Moses O. Onyesolu, Boniface Ekechukwu
Study of Multi-Level Cryptography Algorithm: Multi-Prime RSA and DES
Surinder Kaur, Pooja Bharadwaj, Shivani Mankotia
Platform-Independent Courseware Sharing
Takao Shimomura, Adriano Montanaro
Performance Evaluation of Authentication-Encryption and Confidentiality Block Cipher Modes of Operation on Digital Image
Narges Mehran, Mohammad Reza Khayyambashi
Video Steganography: Secure Data Hiding Technique
Gat Pooja Rajkumar, V. S. Malemath
New Design of Tiny-Block Hybridization in AES
Ritu Goyal, Mehak Khurana
A New Technique for Segmentation of Handwritten Numerical Strings of Bangla Language
Md. Aktaruzzaman, Md. Farukuzzaman Khan, Ahsan-Ul-Ambia
The Extensive Bit-level Encryption System (EBES)
Satyaki Roy
Semantic Multi-granular Lock model for Object Oriented Distributed Systems
V.Geetha, N.Sreenath
Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops
Shahram Behzad, Reza Fotohi, Shahram Jamali
Secure and Optimized Authentication Scheme in Proxy Mobile IPv6 (SOAS-PMIPv6) to reduce Handover Latency
Arun Kumar Tripathi, J. S. Lather, R. Radhakrishnan
Study of Parametric Performance Evaluation of Machine Learning and Statistical Classifiers
Yugal kumar, G. Sahoo
Multi-dimensional Range Query on Outsourced Database with Strong Privacy Guarantee
Do Hoang Giang, Ng Wee Keong
Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards
Quist-Aphetsi Kester, Koumadi Koudjo M, Nii.Narku Quaynor
Service Oriented Architecture for Remote Sensing Satellite Telemetry Data Implemented on Cloud Computing
Abdelfattah El-Sharkawi, Ahmed Shouman, Sayed Lasheen
Evaluation of the Extended CBD Model: A Case Study using IMS Application
M. Rizwan Jameel Qureshi, Ahmed Barnawi
A New Method to Improve Round Robin Scheduling Algorithm with Quantum Time Based on Harmonic-Arithmetic Mean (HARM)
Ashkan Emami Ale Agha, Somayyeh Jafarali Jassbi
Design and Implementation of a Security Scheme for Detecting System Vulnerabilities
Sonali Sharma, Shilpa Mahajan
Empirical Study of an Improved Component Based Software Development Model using Expert Opinion Technique
Asif Irshad Khan, Md. Mottahir Alam, Noor-ul-Qayyum, Usman Ali Khan
Frame Relay versus Asynchronous Transfer Mode: A Comparative Study and Simulation
Ibrahim Ali Ibrahim Diyeb, Sharaf A. Alhomdy
Improving Security Using a Three-Tier Authentication for Automated Teller Machine (ATM)
Moses O. Onyesolu, Amara C. Okpala
Performance Analysis of Improved Clustering Algorithm on Real and Synthetic Data
Anand Khandare, A. S. Alvi
Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense
Muhammad Aamir, Muhammad Arif
Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets
Chandrashekhar Azad, Vijay Kumar Jha
General Research on Image Segmentation Algorithms
Qingqiang Yang, Wenxiong Kang
Evaluating Design Patterns of Commercial Web Applications using Net Easy Score
Tharis Thimthong, Thippaya Chintakovid, Soradech Krootjohn
Automatic Image Segmentation Base on Human Color Perceptions
Yu Li-jie, Li De-sheng, Zhou Guan-ling
Improvement of Component Integration Testing Technique
Khulood Salem Albeladi, M. Rizwan Jameel Qureshi
Mechanism and Algorithm for Indirect Schema Mapping Composition
Bo Wang, Bo Guo
A Proposal of Case Based Reasoning System for the Appropriate Selection of Components Using CBD
Abrar Omar Alkhamisi, M. Rizwan Jameel Qureshi
Improving Energy Efficient Clustering Method for Wireless Sensor Network
Md. Imran Hossain, M. Mahbubur Rahman, Tapan Kumar Godder, Mst. Titasa Khatun
An Improvement over AODV Routing Protocol by Limiting Visited Hop Count
Reza Fotohi, Shahram Jamali, Fateme Sarkohaki, Shahram Behzad
Performance Analysis of Software Effort Estimation Models Using Neural Networks
E.Praynlin, P.Latha
Validation of Novel Approach to Detect Type Mismatch Problem Using Component Based Development
M. Rizwan Jameel Qureshi, Ebtesam Ahmad Alomari
Performance Analysis of Classification Methods and Alternative Linear Programming Integrated with Fuzzy Delphi Feature Selection
Bahram Izadi, Bahram Ranjbarian, Saeedeh Ketabi, Faria Nassiri-Mofakham
Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols
Reza Fotohi, Shahram Jamali, Fateme Sarkohaki
Optimizing QoS for Multimedia Services in Next Generation Network Based on ACO Algorithm
Dac-Nhuong Le
Ontology Based Information Retrieval in Semantic Web: A Survey
Vishal Jain, Mayank Singh
Web Crawler Based on Mobile Agent and Java Aglets
Md. Abu Kausar, V. S. Dhaka, Sanjeev Kumar Singh
Secluding Efficient Geographic Multicast Protocol against Multicast Attacks
A. Amuthan, R. Kaviarasan, S. Parthiban