Vol 9, No. 3, May 2012 (13)
08 March 2012
An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks
Rajaram Ayyasamy1 and Palaniswami Subramani2
1Anna University Coimbatore
1Anna University Coimbatore
Published in
Vol 9, No. 3, May 2012
15 November 2011
A Cross-Layer Based Intrusion Detection Technique for Wireless Networks
Jatinder Singh1, Lakhwinder Kaur2, and Savita Gupta3
1Director, Universal Institute of Engg.
1Director, Universal Institute of Engg.
Published in
Vol 9, No. 3, May 2012
15 November 2011
An Effective Data Warehousing System for RFID using Novel Data Cleaning, Data Transformation and Loa
An Effective Data Warehousing System for RFID using Novel Data Cleaning, Data Transformation and Loading Techniques
Barjesh Kochar1 and Rajender Singh Chhillar2<
Published in
Vol 9, No. 3, May 2012
15 November 2011
Neural Disparity Map Estimation from Stereo Image
Nadia Baha and Slimane Larabi
Computer Science Department, University of Science and Technology-Houari Boumediene,
Computer Science Department, University of Science and Technology-Houari Boumediene,
Published in
Vol 9, No. 3, May 2012
15 November 2011
A Novel Radon-Wavelet-based Multi-Carrier Code Division Multiple Access Transceiver Design and Simul
A Novel Radon-Wavelet-based Multi-Carrier Code Division Multiple Access Transceiver Design and Simulation under Different Channel Conditions
Abbas Hasan Kattoush
EE Engineering
EE Engineering
Published in
Vol 9, No. 3, May 2012
14 November 2011
Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems
Shadi Aljawarneh, Abdullah Alhaj
Faculty of Information Technology,
Faculty of Information Technology,
Published in
Vol 9, No. 3, May 2012
14 November 2011
Comparison of Genetic Algorithm and Quantum Genetic Algorithm
Zakaria Laboudi and Salim Chikhi
SCAL group, MISC Laboratory, University Mentouri, Constantine, Algeria.<
SCAL group, MISC Laboratory, University Mentouri, Constantine, Algeria.<
Published in
Vol 9, No. 3, May 2012
14 November 2011
A Hybrid Approach for Urdu Sentence Boundary Disambiguation
Zobia Rehman, Waqas Anwar
Department of Computer Science, COMSATS Institute of IT,
Department of Computer Science, COMSATS Institute of IT,
Published in
Vol 9, No. 3, May 2012
14 November 2011
Facile Programming
Hanan Elazhary
Computers and Systems Department, Electronics Research Institute, Egypt
Computers and Systems Department, Electronics Research Institute, Egypt
<
Published in
Vol 9, No. 3, May 2012
14 November 2011
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
Thulasimani Lakshmanan1, Madheswaran Muthusamy2
1Lecturer, Department of ECE PSG College
1Lecturer, Department of ECE PSG College
Published in
Vol 9, No. 3, May 2012
More...
14 November 2011
Representing Access Control Policies in Use Cases
Khaled Alghathbar
College of Computer and Information Sciences, Center of Excellence Information Assurance, King
College of Computer and Information Sciences, Center of Excellence Information Assurance, King
Published in
Vol 9, No. 3, May 2012
14 November 2011
A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography
Shu-Fen Tu 1 and Ching-Sheng Hsu 2
1 Department of Information Management,
1 Department of Information Management,
Published in
Vol 9, No. 3, May 2012
14 November 2011
An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Application
An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Applications
Lo’ai Tawalbeh1, Yaser Jararweh2, and Abidalrahman Moh’d3<
Published in
Vol 9, No. 3, May 2012
▼
- Diploma Courses
- Business and Enterprise
- Digital Literacy & IT
- Health Literacy
- Business Literacy
Starting from Jun. 14 2016
-
Sonstur aut pereis dolibus Starting from Jun. 14 2016
-
The impact of nursing Starting from Jun. 10 2016
-
English for beginner Starting from Jun. 10 2016
-
How to control the risk Starting from Jun. 10 2016