Issue | Title | |
Vol 8, No 7 (2013) | Secure and Scalable Interdomain Routing Architecture for the Future Internet: SSIR | Abstract |
P. Karunakaran, C. Venkatesh | ||
Vol 8, No 9 (2013) | Secure Authentication Technique for Localization in Wireless Sensor Networks | Abstract |
P. S. Velumani, S. Murugappan | ||
Vol 10, No 4 (2015) | Secure Communication Against Framing Attack in Wireless Sensor Network | Abstract |
R. Geetha, E. Kannan | ||
Vol 8, No 7 (2013) | Secure Key Based Key Scheduling for DES and TDES Algorithms | Abstract |
M. Jayakumar, T. Christopher | ||
Vol 8, No 10 (2013) | Secure Medical Image Retrieval Using Dynamic Binary Encoded Watermark | Abstract |
A. Umaamaheshvari, K. Thanushkodi | ||
Vol 8, No 7 (2013) | Secure Multipath Routing Protocol for Certificate Exchange in Mobile Ad Hoc Network | Abstract |
Saju P. John, Philip Samuel | ||
Vol 8, No 9 (2013) | Secure Semantic Aware Middleware: a Security Based Semantic Access Control for Web Services | Abstract |
M. Ramalingam, R. M. S. Parvathi | ||
Vol 8, No 10 (2013) | Secured and Encrypted Data Aggregation with Message Authentication Code in Wireless Sensor Networks | Abstract |
A. Latha, S. Jayashri | ||
Vol 9, No 5 (2014) | Securing Data at Rest by Format Preserving Encryption Using Pass Phrase | Abstract |
S. Vidhya, K. Chitra | ||
Vol 8, No 8 (2013) | Security and Peer Management of Query Routing Technique for P2P Networks | Abstract |
U. V. Arivazhagu, S. Srinivasan | ||
Vol 13, No 1 (2018) | Security of Cloud System by IDS-AM-Clust | Abstract |
Chaimae Saadi, Habiba Chaoui | ||
Vol 8, No 7 (2013) | Security Services for DoS, Hello Flooding and Traffic Analysis in WSN Using Mobile Agents | Abstract |
D. Sheela, G Mahadevan, R. M. S. Parvathi | ||
Vol 8, No 5 (2013) | Segmentation of Cerebrospinal Fluid and Internal Brain Nuclei in Brain Magnetic Resonance Images | Abstract |
D. Selvaraj, R. Dhanasekaran | ||
Vol 11, No 6 (2016) | Selecting and Filtering Association Rules within a Semantic Technique | Abstract |
Mohammed Mouhir, Youssef Balouki, Taoufiq Gadi | ||
Vol 9, No 12 (2014) | Semantic Based Intuitive Topic Search Engine | Abstract |
P. Ajitha, G. Gunasekaran | ||
Vol 8, No 7 (2013) | Semantic Content Based Medical Image Retrieval Using Invariant Contourlet Features with Relevance Feedback Techniques | Abstract |
Hassan M. Fayed, Mohamed R. M. Rizk, Aboul Seoud | ||
Vol 11, No 7 (2016) | Semantic Web Framework for Hybrid Cloud | Abstract |
Salah Eddin Murad, Salah Dowaji | ||
Vol 8, No 11 (2013) | Sem-Rank: a Page Rank Algorithm Based on Semantic Relevancy for Efficient Web Search | Abstract |
V. Vijayadeepa, D. K. Ghosh | ||
Vol 8, No 4 (2013) | Sensitive Information Protection and Recovery Using One to One Compound Mapping | Abstract |
N. V. Chaithanya Kumar Reddy, Diwakar R. Marur, Vidhyacharan Bhaskar | ||
Vol 11, No 8 (2016) | Sensor Array Optimization for Mobile Electronic Nose: Wavelet Transform and Filter Based Feature Selection Approach | Abstract |
Dedy Rahman Wijaya, Riyanarto Sarno, Enny Zulaika | ||
Vol 18, No 2 (2023) | Sensor Integration for Autonomous Docking of a Mobile Robot with Omnidirectional Platform | Abstract |
Farid Alijani | ||
Vol 9, No 1 (2014) | Services and Agents Based Mediation System Architecture (SAMED Architecture) | Abstract |
T. Rachad, S. Elghazi, J. Boutahar | ||
Vol 8, No 10 (2013) | SEVALERPS a New EX-ANTE Multi-Criteria Method for ERP Selection | Abstract |
Abdelilah Khaled, Mohammed Abdou Janati-Idrissi | ||
Vol 10, No 12 (2015) | Shape Prior Active Contours for Computerized Vision Based Train Rolling Stock Parts Segmentation | Abstract |
P. V. V. Kishore, C. Raghava Prasad | ||
Vol 8, No 4 (2013) | Signature Analyzer Block for Secure Node Entry | Abstract |
C. Navaneethan, K. Helen Prabha | ||
851 - 875 of 989 Items | << < 30 31 32 33 34 35 36 37 38 39 > >> |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize