Super User
15 November 2011
On Handling Real-Time Communications in MAC Protocols
Sonia Mammeri and Rachid
Published in
Vol 9, No. 5, September 2012
15 November 2011
Improving Exposure of Intrusion Deception System through Implementation of Hybrid Honeypot
Published in
Vol 9, No. 5, September 2012
15 November 2011
Lossless Data Hiding Based on Histogram Modification
Rajkumar Ramaswamy1 and Vasuki
Published in
Vol 9, No. 5, September 2012
15 November 2011
Content-Based Image Retrieval System Based on Self Organizing Map, Fuzzy Color Histogram and Subtractive Fuzzy Clustering
<
Published in
Vol 9, No. 5, September 2012
15 November 2011
Arabic Text Categorization: A comparative Study of Different Representation Modes
Zakaria Elberrichi
Published in
Vol 9, No. 5, September 2012
15 November 2011
Lossless Image Cryptography Algorithm Based on Discrete Cosine Transform
Sara Tedmori1
Published in
Vol 9, No. 5, September 2012
15 November 2011
PLA Data Reduction for Speeding Up
Time Series Comparison
Bachir
Published in
Vol 9, No. 5, September 2012
15 November 2011
Literature Review of Interactive Cross Language Information Retrieval Tools
Farag Ahmed
Published in
Vol 9, No. 5, September 2012
15 November 2011
A New Image Segmentation Method Based on Particle Swarm Optimization
Fahd
Published in
Vol 9, No. 5, September 2012
16 November 2011
I2MANET Security Logical Specification Framework
Yasir Mohamed and Azween Abdullah<
Published in
Vol 9, No. 6, November 2012
Has no item to show!
Starting from Jun. 14 2016
-
Sonstur aut pereis dolibus Starting from Jun. 14 2016
-
The impact of nursing Starting from Jun. 10 2016
-
English for beginner Starting from Jun. 10 2016
-
How to control the risk Starting from Jun. 10 2016