Effects of MAC Parameters on the Performance of IEEE 802.11 DCF in NS-3 |
Md. Abubakar Siddik, Jakia Akter Nitu, Natasha Islam, Most. Anju Ara Hasi, Jannatun Ferdous, Md. Miz |
Networks & Communications |
13, 6, December, 2021 |
PARAMETRIC STUDY OF MICROWAVE ABSORPTION IN LOSSY DIELECTRIC SLABS |
Isabelle Huynen |
Antennas |
1, 4, October, 2016 |
Context-Aware Security Mechanism for Mobile Cloud Computing |
Cláudio Aroucha |
Software Engineering & Security |
14, 3, May, 2022 |
ADAPTIVE ARRAY BEAMFORMING USING AN ENHANCED RLS ALGORITHM |
Peter Chuku, Thomas Olwal and Karim Djouani |
Networks & Communications |
8, 1, January, 2018 |
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS |
Subramaniam.T.K1*, Deepa.B2 |
Cloud Computing |
7, 1, January, 2016 |
Foliage Plant Retrieval Using Polar Fourier Transform, Color Moments and Vein Features |
Abdul Kadir, Lukito Edi Nugroho, Adhi Susanto and Paulus Insap Santosa |
Digital Signal & Image Processing |
2, 3, September, 2011 |
Cyber Security of Smart Watches : A Review of the Vulnerabilities with Recommendations Presented to Protect the Wearables |
Aaron James Webb |
Networks & Communications |
14, 3, May, 2022 |
BEHAVIOR STUDY OF ENTROPY IN A DIGITAL IMAGE THROUGH AN ITERATIVE ALGORITHM OF THE MEAN SHIFT FILTERING |
Esley Torres, Yasel Garces, Osvaldo Pereira and Roberto Rodriguez |
Mathematics and statistics |
54, 3, August, 2015 |
DTWDIR: AN ENHANCED DTW ALGORITHM FOR AUTISTIC CHILD BEHAVIOUR MONITORING |
Salwa O Slim1, Ayman Atia1, and Mostafa-Sami M.Mostafa1 |
Networks & Communications |
7, 2, April, 2016 |
Performance analysis of DWT based OFDM over FFT based OFDM and implementing on FPGA |
Veena M. B and M. N. Shanmukha Swamy |
Digital Signal & Image Processing |
2, 3, September, 2011 |
Comparative Study of Triangulation Based and Feature Based Image Morphing |
Bhumika G. Bhatt, |
Digital Signal & Image Processing |
2, 4, December, 2011 |
Blockchain Security : Enhanced Control Evaluation Approach to Protect Organizations’ Accounting Information |
Angel R. Otero |
Software Engineering & Security |
14, 3, May, 2022 |
OPTIMAL PID CONTROLLER DESIGN FOR SPEED CONTROL OF A SEPARATELY EXCITED DC MOTOR: A FIREFLY BASED OPTIMIZATION APPROACH |
Pikaso Pal1, Rajeeb Dey2, Raj Kumar Biswas2, Shubhashish Bhakta2 |
Circuits |
4, 4, November, 2015 |
A Review on Scheduling in Cloud Computing |
Sujitha.A1, Gunasekar.K2 |
Cloud Computing |
7, 3, July, 2016 |
Detecting Malware in Portable Executable Files using Machine Learning Approach |
Tuan Nguyen Kim |
Software Engineering & Security |
14, 3, May, 2022 |
Area-Efficient Design of Scheduler for Routing Node of Network-On-Chip |
Rehan Maroofi,V. N. Nitnaware and S. S. Limaye |
Digital Signal & Image Processing |
2, 3, September, 2011 |
DrowsyNet: Multivariate Time Series Classification for Embedded Driver Drowsiness Detection |
Shicheng Zu |
Computer Science & Information Technology |
1, 1, May, 2022 |
Implementing Cepstral Filtering Technique Using Gabor Filters to Find Stereoscopic Disparity |
Sheena Sharma, Harshit Agarwal and C. M. Markan |
Digital Signal & Image Processing |
2, 4, December, 2011 |
yber Security of Smart Watches : A Review of the Vulnerabilities with Recommendations Presented to Protect the Wearables |
Aaron James Webb |
Networks & Communications |
14, 3, May, 2022 |
An Evaluation of Security in Blockchain-based Sharing of Student Records in Higher Education |
Timothy Arndt |
Software Engineering & Security |
14, 3, May, 2022 |