Browse Title Index


 
Issue Title
 
Vol 2, No 6 (2013) Performance Analysis of Ethernet LAN Network Connection under Different Network Devices Abstract   PDF
Sadiq Kolawole A, Abdulrahman Tosho A, Sadiq Bolaji N.
 
Vol 1, No 3 (2012) Performance Analysis of Load Minimization In AODV and FSR Abstract   PDF
G Vetrichelvi, G Mohankumar
 
Vol 2, No 6 (2013) Performance Comparison of Space Time Block Coding with Code Rate ½ and ¾ for Turbo Coded Multiple Input Multiple Output System Abstract   PDF
M. M. Kamruzzaman
 
Vol 3, No 2 (2014) Performance Comparison of Turbo Coded Single Input Multiple Output System Using Selective Combining, Equal Gain Combining and Maximal Ratio Combining Abstract   PDF
M. M. Kamruzzaman
 
Vol 1, No 4 (2012) Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set Abstract   PDF
A. M. Chandrashekhar, K. Raghuveer
 
Vol 1, No 3 (2012) Performance Evaluation of UWB Wireless Link Abstract   PDF
Joanne Gomes, Mishra Braj Kishore
 
Vol 2, No 2 (2013) PKC Scheme Based on DDLP Abstract   PDF
Chandrashekhar Meshram, Suchitra A. Meshram
 
Vol 1, No 4 (2012) Portable SCADA Security Toolkits Abstract   PDF
Guillermo A Francia III, Nourredine Beckhouche, Terry Marbut, Curtis Neuman
 
Vol 3, No 2 (2014) Privacy Amplification in Quantum Cryptography BB84 using Combined Univarsal 2 -Truly Random Hashing Abstract   PDF
Ahmed Mahmoud Abbas, Amr Goneid, Sherif El-Kassas
 
Vol 3, No 6 (2014) Probabilistic Modeling of Information Diffusion in Online Social Networks (OSN): An Empirical Study Abstract   PDF
Andrea da Silva, Patrick Mukala
 
Vol 2, No 3 (2013) PSO and ACO Algorithms Applied to Optimization Resource Allocation to Support QoS Requirements in NGN Abstract   PDF
Dac- Nhuong Le
 
Vol 2, No 3 (2013) Quantum password sharing scheme using trusted servers Abstract   PDF
Gabriela Mogos
 
Vol 4, No 1 (2015) Rabin Cryptosystem and Its Extension Abstract   PDF
Nisheeth Saxena, Dr.Rajeev Pourush
 
Vol 2, No 4 (2013) Research on node localization algorithm based on CNRD in wireless sensor network Abstract   PDF
Alireza Souri, Monire Norouzi
 
Vol 1, No 2 (2012) Review on Attack and Defense in Tor Abstract   PDF
Muhammad Aamir
 
Vol 1, No 2 (2012) SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message Abstract   PDF
Somdip Dey
 
Vol 1, No 2 (2012) Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms Abstract   PDF
T.D.B Weerasinghe
 
Vol 4, No 1 (2015) Secure hash functions using programmable cellular automata Abstract   PDF
Alaa Eddine Belfedhal, Kamel Mohamed Faraoun
 
Vol 2, No 3 (2013) Secured data transmission in a V-Blast encoded MIMO MCCDMA wireless communication system Abstract   PDF
Mousumi Haque, Most. Farjana Sharmin, Shaikh Enayet Ullah
 
Vol 2, No 1 (2013) Securing Wireless Grids: Architecture Designs for Secure WiGLET-to-WiGLET Interfaces Abstract   PDF
Tyson Brooks, Lee McKnight
 
Vol 2, No 1 (2013) Service-Oriented Management for Internet of Things Abstract   PDF
Hui Xu, Wei Liu, Chunzhi Wang, Hongwei Chen
 
Vol 2, No 1 (2013) Solving the File Allocation Problem in the Distributed Abstract   PDF
M. H. Abd El-Aziz, A Younes, M. R. Hassan, H Abdo
 
Vol 2, No 1 (2013) Split-Window LST Algorithms Estimation From AVHRR/NOAA Satellites (7, 9, 11, 12, 14, 15, 16, 17, 18, 19) Using Gaussian Filter Function Abstract   PDF
Mohammed Lahraoua, Naoufal Raissouni, Asaad Chahboun, Abdelilah Azyat, Nizar Ben Achhab
 
Vol 1, No 1 (2012) Synthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costs Abstract   PDF
Saeid Asgari Taghanaki, Behzad Zamani Dehkordi, Ahmad Hatam, Behzad Bahraminejad
 
Vol 2, No 6 (2013) The Prospects of Using Spiking Neural P System for Intrusion Detection Abstract   PDF
Rufai Kazeem Idowu, Ravie Chandren Muniyandi, Zulaiha Ali Othman
 
101 - 125 of 131 Items << < 1 2 3 4 5 6 > >>