|
Issue |
Title |
|
Vol 2, No 6 (2013) |
Performance Analysis of Ethernet LAN Network Connection under Different Network Devices |
Abstract
PDF
|
Sadiq Kolawole A, Abdulrahman Tosho A, Sadiq Bolaji N. |
|
Vol 1, No 3 (2012) |
Performance Analysis of Load Minimization In AODV and FSR |
Abstract
PDF
|
G Vetrichelvi, G Mohankumar |
|
Vol 2, No 6 (2013) |
Performance Comparison of Space Time Block Coding with Code Rate ½ and ¾ for Turbo Coded Multiple Input Multiple Output System |
Abstract
PDF
|
M. M. Kamruzzaman |
|
Vol 3, No 2 (2014) |
Performance Comparison of Turbo Coded Single Input Multiple Output System Using Selective Combining, Equal Gain Combining and Maximal Ratio Combining |
Abstract
PDF
|
M. M. Kamruzzaman |
|
Vol 1, No 4 (2012) |
Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set |
Abstract
PDF
|
A. M. Chandrashekhar, K. Raghuveer |
|
Vol 1, No 3 (2012) |
Performance Evaluation of UWB Wireless Link |
Abstract
PDF
|
Joanne Gomes, Mishra Braj Kishore |
|
Vol 2, No 2 (2013) |
PKC Scheme Based on DDLP |
Abstract
PDF
|
Chandrashekhar Meshram, Suchitra A. Meshram |
|
Vol 1, No 4 (2012) |
Portable SCADA Security Toolkits |
Abstract
PDF
|
Guillermo A Francia III, Nourredine Beckhouche, Terry Marbut, Curtis Neuman |
|
Vol 3, No 2 (2014) |
Privacy Amplification in Quantum Cryptography BB84 using Combined Univarsal 2 -Truly Random Hashing |
Abstract
PDF
|
Ahmed Mahmoud Abbas, Amr Goneid, Sherif El-Kassas |
|
Vol 3, No 6 (2014) |
Probabilistic Modeling of Information Diffusion in Online Social Networks (OSN): An Empirical Study |
Abstract
PDF
|
Andrea da Silva, Patrick Mukala |
|
Vol 2, No 3 (2013) |
PSO and ACO Algorithms Applied to Optimization Resource Allocation to Support QoS Requirements in NGN |
Abstract
PDF
|
Dac- Nhuong Le |
|
Vol 2, No 3 (2013) |
Quantum password sharing scheme using trusted servers |
Abstract
PDF
|
Gabriela Mogos |
|
Vol 4, No 1 (2015) |
Rabin Cryptosystem and Its Extension |
Abstract
PDF
|
Nisheeth Saxena, Dr.Rajeev Pourush |
|
Vol 2, No 4 (2013) |
Research on node localization algorithm based on CNRD in wireless sensor network |
Abstract
PDF
|
Alireza Souri, Monire Norouzi |
|
Vol 1, No 2 (2012) |
Review on Attack and Defense in Tor |
Abstract
PDF
|
Muhammad Aamir |
|
Vol 1, No 2 (2012) |
SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message |
Abstract
PDF
|
Somdip Dey |
|
Vol 1, No 2 (2012) |
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms |
Abstract
PDF
|
T.D.B Weerasinghe |
|
Vol 4, No 1 (2015) |
Secure hash functions using programmable cellular automata |
Abstract
PDF
|
Alaa Eddine Belfedhal, Kamel Mohamed Faraoun |
|
Vol 2, No 3 (2013) |
Secured data transmission in a V-Blast encoded MIMO MCCDMA wireless communication system |
Abstract
PDF
|
Mousumi Haque, Most. Farjana Sharmin, Shaikh Enayet Ullah |
|
Vol 2, No 1 (2013) |
Securing Wireless Grids: Architecture Designs for Secure WiGLET-to-WiGLET Interfaces |
Abstract
PDF
|
Tyson Brooks, Lee McKnight |
|
Vol 2, No 1 (2013) |
Service-Oriented Management for Internet of Things |
Abstract
PDF
|
Hui Xu, Wei Liu, Chunzhi Wang, Hongwei Chen |
|
Vol 2, No 1 (2013) |
Solving the File Allocation Problem in the Distributed |
Abstract
PDF
|
M. H. Abd El-Aziz, A Younes, M. R. Hassan, H Abdo |
|
Vol 2, No 1 (2013) |
Split-Window LST Algorithms Estimation From AVHRR/NOAA Satellites (7, 9, 11, 12, 14, 15, 16, 17, 18, 19) Using Gaussian Filter Function |
Abstract
PDF
|
Mohammed Lahraoua, Naoufal Raissouni, Asaad Chahboun, Abdelilah Azyat, Nizar Ben Achhab |
|
Vol 1, No 1 (2012) |
Synthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costs |
Abstract
PDF
|
Saeid Asgari Taghanaki, Behzad Zamani Dehkordi, Ahmad Hatam, Behzad Bahraminejad |
|
Vol 2, No 6 (2013) |
The Prospects of Using Spiking Neural P System for Intrusion Detection |
Abstract
PDF
|
Rufai Kazeem Idowu, Ravie Chandren Muniyandi, Zulaiha Ali Othman |
|
101 - 125 of 131 Items |
<< < 1 2 3 4 5 6 > >> |