研究文章
Efficient and Secure Route Discover by Stability Link Selection of Neighbours in MANET
The Use and Industrial Importance of Virtual Databases
Social Networks Privacy-Preserving On Collaborative Tagging and Spam Filter Using Naive Bayes Algorithm
An Efficient Attack Resistance Model Using Application Based Polynomial Distribution
A Survey of Cloud Authentication Attacks and Solution Approaches
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
Mobile Social TV based on Cloud
Mitigation of Vampire Attacks in Wireless Sensor Networks
Neighbour Position Discovery and Verification in MANETs
A Novel Cloud based Mobile Social TV
Advanced Data Access Scheme in Disruption Tolerant Network
A Survey of Random Routing Protocol for Load Reduction in MANET's
OTP Encryption Techniques in Mobiles for Authentication and Transaction Security
A Proportional Learning on Sink, Warm Hole Attacks with Prevention Algorithms in Wireless Sensor Networks PLSWHA-WSN
Comprehensive and Comparative Analysis of Cryptographic Solutions in Cloud
Efficient Content Based Image Retrieval System in Visual Words, Color and Edge Directive Descriptors and Fuzzy Color and Texture Histogram
A Survey of Associate Access Points to Increase the Performance of IEEE 802.11 Wirelesses LAN
A Survey of Clustering In Mobile Ad-Hoc Networks
Challenges to Privacy and Risk Oriented RFID System Implementation in Libraries
To Enhance the Network Lifetime Based On EDIT Algorithm in Wireless Sensor Networks
A Neoteric Approaches To Efficient Data Transmission and Avoid Address Collision in Wireless Network Interface
Designing Of Fast Multipliers with Ancient Vedic Techniques
Enhancing the Performance of Mining High Utility Itemsets Based On Pattern Algorithm
Dijkstra’s Shortest Path Algorithm for Road Network
Hot Topics Perception in Social Network
Improvement of Energy Efficiency in Wireless Sensor Network Using Intelligent Water Drop
Big Data Analytics Security Issues in Data Driven Information System
Stateless Routing for Wireless Networks Using Ravenous Perimeter
A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing
A Study of Information Extraction Tools for Online English Newspapers (PDF): Comparative Analysis
A Study on Unidentified Routing Protocols in MANETs
A Survey on Delegated Access Control in Public Cloud
A Survey on Detection of Mining Service Information Discovery Using SASF Crawler
Spectral Response of FWM in EDFA for Long-haul Optical Communication
A Survey of Frequent and Infrequent Weighted Itemset Mining Approaches
Stress causing Arrhythmia Detection from ECG Signal using HMM
A Survey of Web Image Search and Re- Ranking Technique
Link Quality Aware Wireless Sensor Networks Using Adaptive Code Dissemination Protocol
Incremental Violation Detection of Inconsistencies in Distributed Cloud Data
A Data Mining Model to Read and Classify Your Employees’ Attitude
Protection of Smartphone, Personal Computer and Other Similar Devices from Virus Infections
Investigations on Remote Virtual Machine to Secure Lifetime PHR in Cloud
A Novel Technique for Detection of CVSD Encoded Bit Stream
Certain Investigations on Securing Moving Data Objects
Investigations on Evolution of Strategies to Preserve Privacy of Moving Data Objects
Certain Investigations on Strategies for Protecting Medical Data in Cloud
DC Chopping for High Power Application
Impact of Using G.729 on the Voice over LTE Performance
Responsive Communication Jamming Detector with Noise Power Fluctuation using Cognitive Radio
Improving Ad Hoc Network Behaviour Using Clustering T echnique with NS2
查看更多