Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
Effects of MAC Parameters on the Performance of IEEE 802.11 DCF in NS-3 Md. Abubakar Siddik, Jakia Akter Nitu, Natasha Islam, Most. Anju Ara Hasi, Jannatun Ferdous, Md. Miz Networks & Communications 13, 6, December, 2021
PARAMETRIC STUDY OF MICROWAVE ABSORPTION IN LOSSY DIELECTRIC SLABS Isabelle Huynen Antennas 1, 4, October, 2016
Context-Aware Security Mechanism for Mobile Cloud Computing Cláudio Aroucha Software Engineering & Security 14, 3, May, 2022
ADAPTIVE ARRAY BEAMFORMING USING AN ENHANCED RLS ALGORITHM Peter Chuku, Thomas Olwal and Karim Djouani Networks & Communications 8, 1, January, 2018
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS Subramaniam.T.K1*, Deepa.B2 Cloud Computing 7, 1, January, 2016
Foliage Plant Retrieval Using Polar Fourier Transform, Color Moments and Vein Features Abdul Kadir, Lukito Edi Nugroho, Adhi Susanto and Paulus Insap Santosa Digital Signal & Image Processing 2, 3, September, 2011
Cyber Security of Smart Watches : A Review of the Vulnerabilities with Recommendations Presented to Protect the Wearables Aaron James Webb Networks & Communications 14, 3, May, 2022
BEHAVIOR STUDY OF ENTROPY IN A DIGITAL IMAGE THROUGH AN ITERATIVE ALGORITHM OF THE MEAN SHIFT FILTERING Esley Torres, Yasel Garces, Osvaldo Pereira and Roberto Rodriguez Mathematics and statistics 54, 3, August, 2015
DTWDIR: AN ENHANCED DTW ALGORITHM FOR AUTISTIC CHILD BEHAVIOUR MONITORING Salwa O Slim1, Ayman Atia1, and Mostafa-Sami M.Mostafa1 Networks & Communications 7, 2, April, 2016
Performance analysis of DWT based OFDM over FFT based OFDM and implementing on FPGA Veena M. B and M. N. Shanmukha Swamy Digital Signal & Image Processing 2, 3, September, 2011
Comparative Study of Triangulation Based and Feature Based Image Morphing Bhumika G. Bhatt, Digital Signal & Image Processing 2, 4, December, 2011
Blockchain Security : Enhanced Control Evaluation Approach to Protect Organizations’ Accounting Information Angel R. Otero Software Engineering & Security 14, 3, May, 2022
OPTIMAL PID CONTROLLER DESIGN FOR SPEED CONTROL OF A SEPARATELY EXCITED DC MOTOR: A FIREFLY BASED OPTIMIZATION APPROACH Pikaso Pal1, Rajeeb Dey2, Raj Kumar Biswas2, Shubhashish Bhakta2 Circuits 4, 4, November, 2015
A Review on Scheduling in Cloud Computing Sujitha.A1, Gunasekar.K2 Cloud Computing 7, 3, July, 2016
Detecting Malware in Portable Executable Files using Machine Learning Approach Tuan Nguyen Kim Software Engineering & Security 14, 3, May, 2022
Area-Efficient Design of Scheduler for Routing Node of Network-On-Chip Rehan Maroofi,V. N. Nitnaware and S. S. Limaye Digital Signal & Image Processing 2, 3, September, 2011
DrowsyNet: Multivariate Time Series Classification for Embedded Driver Drowsiness Detection Shicheng Zu Computer Science & Information Technology 1, 1, May, 2022
Implementing Cepstral Filtering Technique Using Gabor Filters to Find Stereoscopic Disparity Sheena Sharma, Harshit Agarwal and C. M. Markan Digital Signal & Image Processing 2, 4, December, 2011
yber Security of Smart Watches : A Review of the Vulnerabilities with Recommendations Presented to Protect the Wearables Aaron James Webb Networks & Communications 14, 3, May, 2022
An Evaluation of Security in Blockchain-based Sharing of Student Records in Higher Education Timothy Arndt Software Engineering & Security 14, 3, May, 2022

More. .

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals