Super User

On Handling Real-Time Communications in MAC Protocols

Sonia Mammeri and Rachid
Written by

Improving Exposure of Intrusion Deception System through Implementation of Hybrid Honeypot

Written by

Lossless Data Hiding Based on Histogram Modification

Rajkumar Ramaswamy1 and Vasuki
Written by

Content-Based Image Retrieval System Based on Self Organizing Map, Fuzzy Color Histogram and Subtractive Fuzzy Clustering
<

Written by

Arabic Text Categorization: A comparative Study of Different Representation Modes

Zakaria Elberrichi
Written by

Lossless Image Cryptography Algorithm Based on Discrete Cosine Transform

Sara Tedmori1
Written by

PLA Data Reduction for Speeding Up
Time Series Comparison

Bachir
Written by

Literature Review of Interactive Cross Language Information Retrieval Tools

Farag Ahmed
Written by

A  New Image Segmentation Method Based on Particle Swarm Optimization

Fahd
Written by

I2MANET Security Logical Specification Framework

Yasir Mohamed  and Azween Abdullah<
Written by
Page 51 of 170
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…