Artigo de edição especial
An Enhanced Rationalize Security and Efficient Data Gathering In Wireless Sensor Networks
Artigo de edição especial
Load Balanced Connection Aware Clustering Algorithm for Wireless Sensor Networks
Artigo de edição especial
Extracting the Information by Ranking Techniques to Increase the Privacy of Search Engine
Artigo de edição especial
Avoiding Traffic Congestion Using Position Based Routing Protocol in VANET
Artigo de edição especial
Visual Impairment and Blindness Identification Using Mathematical Analysis in the Retinal Vessels
Artigo de edição especial
TSROD: Time Synchronization By Reducing Ocean’s Delay In Underwater Wireless Networks
Artigo de edição especial
An improved Automatic Virus particle Detection method based on adaptive K-NN classifier
Artigo de edição especial
An Enhanced Token Ring Technique for Overhead cut Detection Scheme in Distributed Mesh Networks
Artigo de edição especial
Tumor cut segmentation for Blemish Cells Detection in Human Brain Based on Cellular Automata
Artigo de edição especial
Design and Detection of Covert Timing Channels and Spyware Using Warden Technique
Artigo de edição especial
A New Approach For Collaborative Data Publishing Using Slicing And M-Privacy
Artigo de edição especial
Obtaining Optimal Software Effort Estimation Data Using Feature Subset Selection
Artigo de edição especial
Unconstrained Face Recognition Using SVM Across Blurred And Illuminated Images With Pose Variation
Artigo de edição especial
Regularized Sparse Kernel SFA with Decorrelation Filtering For Separating Correlated Sources
Artigo de edição especial
New Dimensional Approach towards Fraps-Face Recognition after Plastic Surgery
Artigo de edição especial
Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code
Artigo de edição especial
Securing Location and trust extended authentication in mobile ad hoc network
Artigo de edição especial
Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network
Artigo de edição especial
Dynamic Resource Allocation And Distributed Video Transcoding Using Hadoop Cloud Computing
Artigo de edição especial
Intrution Resilience Using Self-Healing Mechanism In Mobile Unattended Wsns
Artigo de edição especial
Improving The Performance For Failure-Aware Resource Provisioning In Cloud
Artigo de edição especial
Accomplishing Minimum Data Sets Transfer Cost in the Cloud through Ant Colony Optimization
Artigo de edição especial
Detection of Tricking Attack and Localization Of Deceivers In Multiple Wireless Networks
Artigo de edição especial
Encryption Techniques for Storing Personal Health Details (PHR) In Privacy Cloud
Artigo de edição especial
High-Capacity Reversible Data Hiding In Binary Images by Using Pattern Substitution
Artigo de edição especial
Detection of an Inflammatory Disease Based on Classification of Tissues in Brain MRI
Artigo de edição especial
Artigo de edição especial
Error Reduction in WiMAX Deinterleaver Address Generator by Using Majority Logic Circuit
Artigo de edição especial
An Energy Efficient Multicast Routing Based On Genetic Algorithm for MANET
Artigo de edição especial
An Efficient Way of Detecting Denial-Of-Service Attack Using Multivariate Correlation Analysis
Artigo de edição especial
A Fast Clustering Based Feature Subset Selection Using Affinity Propagation Algorithm
Artigo de edição especial
MULTI ORGANIZATION RECORD SHARING IN CLOUD COMPUTING USING ATTRIBUTEBASED ENCRYPTION
Artigo de edição especial
Optimizing User Navigation with Pattern based Web Site Restructuring Scheme
Artigo de edição especial
Anonymous Privacy-Preserving Routing In Location Based Dynamic Ad-Hoc Networks
Artigo de edição especial
Privacy Preserved Association Rule Mining For Attack Detection and Prevention
Artigo de edição especial
Visual Text Summarization in Supervised and Unsupervised Constraints Using CITCC
Artigo de edição especial
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition
Artigo de edição especial
Efficient Load Balanced Routing Algorithm Based On Genetic And Particle Swarm Optimization
Artigo de edição especial
Securing Location and trust extended authentication in mobile ad hoc network
Artigo de edição especial
Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code
Artigo de edição especial
Prevention Model For Phishing Attacks In Web Applications Using Linkguard Algorithm
Artigo de edição especial
Secure Cluster Formation And Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network
Artigo de edição especial
Improving Privacy And Data Utility For High- Dimensional Data By Using Anonymization Technique
Artigo de edição especial
An Efficient Approach For Multimedia Transmission Using Multipath Routing In Manet
Artigo de edição especial
User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe
Artigo de edição especial
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Artigo de edição especial
Optimization Of Energy Efficient Communication To Improve The Lifetime Of Sensor
Artigo de edição especial
An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images
Artigo de edição especial
Tour Planning For Mobile Data-Gathering Mechanisms In Wireless Sensor Networks
Artigo de edição especial
Effective Heart Disease Prediction using Frequent Feature Selection Method
Artigo de edição especial
To improve Security enhancement and Lifetime Management Scheme for Wireless Sensor Networks
Artigo de edição especial
Secured And Reliable Data Transmission Using Lychrel Numbers Rgb Colors And One Time Password
Artigo de edição especial
Detecting Forged Acknowledgement in Mobile Ad-Hoc Network Using Intrusion Detection System
Artigo de edição especial
Artigo de edição especial
A Rational Approach For Data Reporting In Wireless Sensor Networks Using Sink Trial Protocol
Artigo de edição especial
Security Scenarios over Cloud Computing through Espousing Multi-Cloud Structure
Artigo de edição especial
Protecting Web Service Composition From Privacy Attacks Using Dynamic Privacy Model
Artigo de edição especial
Thecritical Event Monitoring In Wireless Sensor Networks Using Sleep Scheduling
Artigo de edição especial
An Enhanced Memory Management For An Advanced Line Buffer Based Image Processing Pipeline
Artigo de edição especial
Bottleneck Zone Analysis in Wireless Sensor Network Using XOR Operation and Duty Cycle
Artigo de edição especial
Artigo de edição especial
A Novel Approach for Restructuring Web Search Results by Feedback Sessions Using Fuzzy clustering
Artigo de edição especial
Securing Data Packets from Vampire Attacks in Wireless Ad-Hoc Sensor Network
Artigo de edição especial
Reduction of End To End Delay Using Priority Queues in Wireless Sensor Network
Artigo de edição especial
Efficient Resource Allocation And Avoid Traffic Redundancy Using Chunking And Indexing
Artigo de edição especial
A N-Radon Slantlet Transforms Based OFDM System Design with PCC Algorithm to improve the Performance
Artigo de edição especial
Congestion Based Pricing Resources Managemant In Broadband Wireless Networks
Artigo de edição especial
Electromagnetic Coupling Microstrip Patch Antenna for Improving Wide Bandwidth and Broad Beamwidth
Artigo de edição especial
Access Control Policies Of Socio Networking Websites For Multiple Profile Holders
Artigo de edição especial
Enhanced Detection of Packet Droppers And Modifiers In Wireless Sensor Networks
Artigo de edição especial
Brain Tumor Statistical Structure Analysis And Prediction Based On Self Organised Map
Artigo de edição especial
AMAP: Accelerated Message Authentication Protocol for Vehicular ADHOC Networks
Artigo de edição especial
Rank Preserving Discriminant Analysis for Human Behaviour Recognition Using Dash7 Protocol
Artigo de edição especial
Performance Optimization Of Poultry Farm By Using Instrumentation With Help Of Embedded Automation
Artigo de edição especial
Beyond Text QA Multimedia diverse relevance ranking based Answer Generation by Extracting Web
Artigo de edição especial
Unconstrained Face Recognition From Blurred and Illumination with Pose Variant Face Image Using SVM
Artigo de edição especial
A Load Balanced Greening Approach for Proficient Resource Allocation with Cloud Partitioning
Artigo de edição especial
Analysis of Secure In-Network Aggregation for Anomaly Detection in Wireless Sensor Networks
Artigo de edição especial
Artigo de edição especial
Letter Pair Similarity Classification and URL Ranking Based on Feedback Approach
Artigo de edição especial
Preventing Mobility Device Intrusion And Theft Using Biometric Fingerprint Recognition
Artigo de edição especial
Sensor Network Deployment and Critical Parameter Selection for Intrusion Detection System
Artigo de edição especial
A Method of Segmentation For Glaucoma Screening Using Superpixel Classification
Artigo de edição especial
Artigo de edição especial
Efficient Algorithms for Incessant Position Based Spatial Queries in Mobile Environments
Artigo de edição especial
A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis
Artigo de edição especial
A Survey on Intrusion Detection in Mobile Ad Hoc Networks Using Enhanced Adaptive Acknowledgment
Artigo de edição especial
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Artigo de edição especial
Efficient Segmentation and Classification of Remote Sensing Image Using Local Self Similarity
Artigo de edição especial
Efficient Segmentation and Classification of Remote Sensing Image Using Local Self Similarity
Artigo de edição especial
Realization of High Speed VLSI Architecture for Decision Tree Based Denoising Method In Images
Artigo de edição especial
Artigo de edição especial
Scott Knott Test Based Effective Software Effort Estimation through a Multiple Comparison Algorithms
Artigo de edição especial
Reduction of Decoding Time in Majority Logic Decoder for Memory Applications
Artigo de edição especial
Removal of High Density Impulse Noise Using Boundary Discriminative Noise Detection Algorithm
Artigo de edição especial
Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System
Artigo de edição especial
Disperse Processing of Presumption Top-K Inquire in Wireless Sensor Networks
Artigo de edição especial
Multiple Class Identification and Categorization with Nuggets on Health Care Data
Artigo de edição especial
Resource Allocation under Uncertainty in Cloud Storage for Computational Environment
Artigo de edição especial
Replica Allocation Technique with Mobility Based Beacons In Mobile Ad Hoc Networks
Artigo de edição especial
Multiview Pedestrian Detection Based on Online Support Vector Machine Using Convex Hull
Artigo de edição especial
Intelligent network stabilization of dynamical systems using topological condition
Artigo de edição especial
Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code
Artigo de edição especial
User Search Histories Based On Query Relevance Using Incremental Algorithm
Artigo de edição especial
Xml Based Digitalized Secure Information Channel Maintenance in Distributed Broking Systems
Artigo de edição especial
Retinal Microaneurysm Exclusion on Optic Disc and Detection Using Cross Section Profile Analysis
Artigo de edição especial
Feature Extraction and Analysis of Breast Lesions in UltrasoundB mode and Elastography
Artigo de edição especial
Handling Flood Attacks in Disruption Tolerant Networks Based On Claim Verification
Artigo de edição especial
Dynamic Congestion Control with Multihop Scheduling Algorithm For Mobile Ad-Hoc Network
Artigo de edição especial
Privacy and Efficiency On Health Care Data Using Private Proxy Reencryption Scheme
Artigo de edição especial
Robust Data Authenticity and Group Signature Mechanism for Enhanced Cloud Security Process
Artigo de edição especial
High Throughput, Low Area, Low Power Distributed Arithmetic Formulation for Adaptive Filter
Artigo de edição especial
Artigo de edição especial
Improving energy and cost-effective workflow scheduling in cloud computing
Artigo de edição especial
A Self Adaptive Approach for Defending Flood Attacks in Disruption Tolerant Networks
Artigo de edição especial
An Anonymous Authentication and Secure Communication Protocol in Ad-hoc Networks
Artigo de edição especial
Artigo de edição especial
Clustering of Data with Mixed Attributes based on Unified Similarity Metric
Artigo de edição especial
Inferring Private Information from Social Network Using Collective Classification
Artigo de edição especial
Design and Implementation of Efficient Binary to Residue Converter Using Moduli Method
Artigo de edição especial
An Effective Cluster-Based Routing With Link Quality For Power Varied Manets
Artigo de edição especial
A Secure Erasure Code-Based Multi Cloud Architecture with Privacy and Preservation
Artigo de edição especial
ADA: Data Aggregation Scheme for Dynamic Application Using PBDR in Wireless Sensor Networks
Artigo de edição especial
Packet Concealing From Discriminating Selective Jamming Attacks Using Prevention Methods
Artigo de edição especial
Securely Managing the Personal Health Records Using Attribute Based Encryption in Cloud Computing
Artigo de edição especial
Effective Neighbor Identification with False Report Verification Using Manets
Artigo de edição especial
Balancing privacy and Utility in Defect Prediction by Privatization Algorithm
Artigo de edição especial
User Centric Privacy Access control For MHealthcare Emergency in Opportunistic Computing
Artigo de edição especial
Balancing privacy and Utility in Defect Prediction by Privatization Algorithm
Artigo de edição especial
An Efficient Resource Allocation for Improving Resource Utilization in Self Organizing Clouds
Artigo de edição especial
Scheduling Enabled Compressive Data Collection Scheme For Wireless Sensor Networks
Artigo de edição especial
Detection and Localization of Multiple Spoofing Attackers in Wireless Network
Artigo de edição especial
Reputation and Quality of Service for Wireless Sensor Networks Using Ant Colony Optimization
Artigo de edição especial
Efficient Method for Secure Transmission from Malicious Nodes through Certificate Authentication
Artigo de edição especial
Cloud-based Secure Log Management using Homomorphic Encryption to reduce Communication Overhead
Artigo de edição especial
Establishing SSH Connection and Interfacing GSM/GPRS Functionality with Raspberry PI
Artigo de edição especial
ETAM Enhanced Trust Authentication Mechanism for Vehicular Ad Hoc Networks
Artigo de edição especial
Systolic Tree Algorithms for Discovering High Utility Itemsets from Transactional Databases
Artigo de edição especial
An Effective Approach for Video Copy Detection and Identification of Misbehaving Users
Artigo de edição especial
Intrusion Detection System to Detect Malicious Misbehaviour Nodes in Manet
Artigo de edição especial
Feature subset selection using filtering with Mutual information and Maximal information coefficient
Artigo de edição especial
Dynamic Key Management System for improving security in Three-Tier environment
Artigo de edição especial
Reduce Traffic in Optical Switching Networks by Using Control Packet Buffering Method
Artigo de edição especial
Using Interleaving Techniques with FEC Mechanisms to Deal with Burst Errors
Artigo de edição especial
Lossless Compression and Efficient Reconstruction of Colour Medical Images
Artigo de edição especial
Per-Colorant-Channel High Capacity Color Barcodes: An Interference Cancellation Framework
Artigo de edição especial
Online and Remote Motor Energy Monitoring and Fault Diagnostics Using Wireless Sensor Networks
Artigo de edição especial
Implementing Black hole Password Entry Technique For Mitigating Shoulder-surfing Threat
Artigo de edição especial
Efficient Techniques for Message Authentication and Communication for Wireless Sensor Network
Artigo de edição especial
Digitalised Secure Information Channel Maintenance in Distributed Broking System
Artigo de edição especial
Integrating Colors, Shapes and Motions Using Active Contour Based Visual Tracking
Artigo de edição especial
A Cost Effective Multicast Key Management Scheme for Secure Group Communication
Artigo de edição especial
Enhanced Intrusion Detection for Zombie Exploration Attacks in Mobile Adhoc Networks
Artigo de edição especial
Dynamic Economic Dispatch for Power Generation Using Hybrid optimization Algorithm
Artigo de edição especial
Adeptness Comparison between Instance Based and K Star Classifiers for Credit Risk Scrutiny
Artigo de edição especial
A Unified Scheduling For Multi-Hop Wireless With Order Optimal Per Flow Delay
Artigo de edição especial
MST Clustering and Relevancy Analysis for Key Element Identification Process
Artigo de edição especial
Disperse Processin Of Presumption Top-K Inquire In Wireless Sensor Networks
Artigo de edição especial
SeCom: A Novel Approach for Malware Confiscation in OS level Virtual Machines
Artigo de edição especial
A support for end user-Centric SLA administration of Cloud-Hosted Databases
Artigo de edição especial
Artificial Intelligence (Biologically inspired intelligent robots using artificial muscles)
Artigo de edição especial
Hyperspectral Image Resolution Enhancement Using Object Tagging OLHE Technique
Artigo de edição especial
An Improved Privacy Preserved Rule Mining for Credit Dataset with Discrimination Prevention
Artigo de edição especial
Artigo de edição especial
Fingerprint Matching Incorporating Ridge Features Using Contourlet Transforms
Artigo de edição especial
Adaptive Fuzzy Based Solution of Inverted Pendulum & Aircraft Landing Problems
Artigo de edição especial
ECG Steganography Based Privacy Protecting Of Medical Data for Telemedicine Application
Artigo de edição especial
Authentication of Online Digitized Content Using Trapdoor Hash Function Method
Artigo de edição especial
Multi Organization Records Sharing in Cloud Computing Using Attribute Based Encryption
Artigo de edição especial
Simple Algorithm for the Magnetic Field Computation in Bobbin Coil Arrangement
Artigo de edição especial
Artigo de edição especial
Efficient Management Algorithm for Non- Interrupting Data Communication in Wireless Networks
Artigo de edição especial
Vibrant Resource Allocation Algorithms using Virtual Machine in Cloud-Survey
Artigo de edição especial
Secure Data Sharing in Cloud Environment Using Multi Authority Attribute Based Encryption
Artigo de edição especial
Efficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks
Artigo de edição especial
Enhancing the High Performance Resource Allocation and Data Sharing in Cloud Computing
Artigo de edição especial
A Survey on Energy Efficient Hierarchical (Leach) Clustering Algorithms in Wireless Sensor Network
Artigo de edição especial
Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks
Artigo de edição especial
A Trust Based Mechanism for Preventing Noncooperative Eavesdropping in WSN
Artigo de edição especial
Detection of Cheater Nodes Based On Evidences and Reports in MultiHop Wireless Networks
Artigo de edição especial
Trust Aware Secure Routing for Cluster-based Wireless Sensor Networks - A Comparative Study
Artigo de edição especial
Detection and Mitigation of DDOS Attacks By Circular IPS Protection Network
Artigo de edição especial
Automation of URL Discovery and Flattering Mechanism in Live Forum Threads
Artigo de edição especial
A Hybrid BTF Approach for Temporal Query Processing In the Patented Medical Database
Artigo de edição especial
A Roadmap to an Enhanced Graph Based Data mining Approach for Multi-Relational Data mining
Artigo de edição especial
Performance and Analysis of Video Streaming of Signals in Wireless Network Transmission
Artigo de edição especial
Discovering Patterns of Human Interaction in Meetings Using Tree-Based Mining
Artigo de edição especial
A Comparative Study of Software Effort Estimation Using Fuzzy Logic Membership Function
Artigo de edição especial
Design & Implementation of Nios II Processor for Low Powered Embedded Systems
Artigo de edição especial
ICGICT-213-Internet Based User Service-Mobile Computing Internet Based User Service
Artigo de edição especial
Dynamic Virtual Machine Scheduling for Resource Sharing In the Cloud Environment
Artigo de edição especial
Garment Company Automation Using the Concept Of Big Data And Open Source Software
Artigo de edição especial
Restoring Degraded Documents by Using Neural Network - KSOM Based Hybrid Techniques
Artigo de edição especial
Cost Effective Resource Mapping Based Requisition Partitioning Through Iterated Local Search
Artigo de edição especial
Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT
Artigo de edição especial
Biometric Fingerprint Verification System Based on BFS using Ridge Features
Artigo de edição especial
Optimal Top-K Queries Computing: Sampling and Energetic Development Approach
Artigo de edição especial
Encryption of Cryptographic key technique by crossover of Iris and Face Biometric key
Artigo de edição especial
An Efficient Approach for Requirement Traceability Integrated With Software Repository
Artigo de edição especial
Near Duplicate Document Detection Using Document-Level Features and Supervised Learning
Artigo de edição especial
Secure Crypto Multimodal Biometric System for the Privacy Protection of User Identification
Artigo de edição especial
Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks
Artigo de edição especial
Artigo de edição especial
Detection of Digital Image Forgeries by Illuminant Color Estimation and Classification
Artigo de edição especial
Cryptography Based Data Aggregation Scheme for Data Integrity Analysis in Wireless Sensor Networks
Artigo de edição especial
Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes
Artigo de edição especial
A Scheme for Detection of License Number Plate by the Application of Genetic Algorithms
Artigo de edição especial
Implementation of E2AODV Protocol for Load Balancing In Cluster Ad-Hoc Network
Artigo de edição especial
Activity Recognition from Video in Day or Night Using Fuzzy Clustering Techniques
Artigo de edição especial
Payment Scheme for Identifying Cheating Reports in Multihop Wireless Networks
Artigo de edição especial
A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms
Artigo de edição especial
Efficient Resources Allocation and Reduce Energy Using Virtual Machines for Cloud Environment
Artigo de edição especial
Survey of Various Techniques to Provide Multilevel Trust in Privacy Preserving Data Mining
Artigo de edição especial
A Modified Bec Logic Design of High Speed Csla For Low Power And Area Efficient Applications
Artigo de edição especial
Decentralised Access Control with Aggregate Key Encyryption For Data Stored In Cloud
Artigo de edição especial
Ocular Artifacts Reduction in EEG Using DWT And ANC For Portable Applications
Artigo de edição especial
HealthCare Monitoring Solution with Decryption Outsourcing by Parallel Computing in Cloud
Artigo de edição especial
Palmprint Recognition Using Adaptive Histogram Equalization and Discrete Curvelet Transform
Artigo de edição especial
Threshold Technique for Mobile Ad-Hoc Networks Using Secured Revocation Check
Artigo de edição especial
A Weighted OFDM Signal Scheme for Peak To Average Power Ratio Reduction Of OFDM Signals
Artigo de edição especial
An Effective Energy and Latency Of Full Text Search Based On TWIG Pattern Queries Over Wireless XML
Artigo de edição especial
Unitary Differential Space Time Frequency Codes For MB-OFDM Uwb Wireless Communications
Artigo de edição especial
Multirate Multicarrier CDMA via Orthogonal Codes for Wireless Mobile Communication
Artigo de edição especial
Improving Security of Single Sign-On Mechanism for Distributed Service Enviornment
Artigo de edição especial
An Improved CBIR Method Using Color and Texture Properties with Relevance Feedback
Artigo de edição especial
An innovative approach in Information Extraction using Ontology for Geospatial Domain
Artigo de edição especial
RCAETP: Reliable and Congestion Aware Event Transmission Protocol in a Wireless Sensor Network
Artigo de edição especial
Effective Image Resizing By Combining Scaling, Seam Carving and Canny Edge Detector