|
Issue |
Title |
|
Volume 2, Issue 5, November 2013 |
Prolonging sensor networks lifetime using convex clusters |
Abstract
PDF
|
Payam Salehi, Mohammad Ebrahim Shiri Ahmad Abadi |
|
Volume 2, Issue 2, May 2013 |
Proposed New Mechanism to Detect and Defend the Malicious Attackers in AODV |
Abstract
PDF
|
Vijay Kumar, Ashwani Kush |
|
Volume 5, Issue 1, January 2016 |
Provable Data Possession Scheme based on Homomorphic Hash Function in Cloud Storage |
Abstract
PDF
|
Li Yu, Junyao Ye |
|
Volume 5, Issue 1, January 2016 |
Providing a framework to improve the performance of business process management projects based on BPMN |
Abstract
PDF
|
Mojtaba Ahmadi, Alireza Nikravanshalmani |
|
Volume 4, Issue 1, January 2015 |
QoS Routing in Multicast Networks Based on Imperialism Competition Algorithm |
Abstract
PDF
|
Parisa Mollamohammada, Abolfazl Toroghi Haghighat |
|
Volume 4, Issue 1, January 2015 |
Ranking the technical dimensions of e-banking service quality evaluation models using Analytical Hierarchy Process |
Abstract
PDF
|
NoorMohammad Yaghubi, Seyed Morteza Seyedin |
|
Volume 5, Issue 1, January 2016 |
Ranking user’s comments by use of proposed weighting method |
Abstract
PDF
|
zahra hariri |
|
Volume 2, Issue 5, November 2013 |
Real-Time and Robust Method for Hand Gesture Recognition System Based on Cross-Correlation Coefficient |
Abstract
PDF
|
Reza Azad, Babak Azad, Iman tavakoli kazerooni |
|
Volume 5, Issue 1, January 2016 |
Real-Time Color Coded Object Detection Using a Modular Computer Vision Library |
Abstract
PDF
|
Antonio J. R. Neves, Alina Trifan, Bernardo Cunha, José Luís Azevedo |
|
Volume 4, Issue 2, March 2015 |
Recent Digital Watermarking Approaches, Protecting Multimedia Data Ownership |
Abstract
PDF
|
Siddarth Gupta, Vagesh Porwal |
|
Volume 3, Issue 2, March 2014 |
Reducing Energy Consumption in Mobile ad hoc Networks Using Energy-aware Routing Algorithm Based on Multiple Routes |
Abstract
PDF
|
Ali Broumandnia, Ehsan Sharifi, Milad Ghahari Bidgoli |
|
Volume 4, Issue 5, September 2015 |
Repeat Finding Techniques, Data Structures and Algorithms in DNA sequences: A Survey |
Abstract
PDF
|
Freeson Kaniwa, Heiko Schroeder, Otlhapile Dinakenyane |
|
Volume 4, Issue 1, January 2015 |
Representing an Effective Approach to Understand the Dynamic Frequent Pattern of Web Visitor |
Abstract
PDF
|
Farid Soleymani Sabzchi, Mehdi Afzali |
|
Volume 5, Issue 2, March 2016 |
Requirements Prioritization: Challenges and Techniques for Quality Software Development |
Abstract
PDF
|
Muhammad Abdullah Awais |
|
Volume 4, Issue 6, November 2015 |
Reverse Modeling and Autonomous Extrapolation of RF Threats |
Abstract
PDF
|
Sanguk Noh, So Ryoung Park |
|
Volume 2, Issue 4, September 2013 |
Reverse Query Tree approach to cope with Id distribution problem in Tree-based tag anti-collision protocols of RFID |
Abstract
PDF
|
Milad HajMirzaei |
|
Volume 4, Issue 1, January 2015 |
Robust flip-flop Redesign for Violation Minimization Considering Hot Carrier Injection (HCI) and Negative Bias Temperature Instability (NBTI) |
Abstract
PDF
|
Naeun Zang, Juho Kim |
|
Volume 4, Issue 2, March 2015 |
Robust method for Gaze Recognition Using Histogram Thresholding and Neural Network |
Abstract
PDF
|
Maliheh sadat sakhaie, Mahmoud mahlouji, Omid ghahari |
|
Volume 3, Issue 5, September 2014 |
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags |
Abstract
PDF
|
Seyed Mohammad Alavi, Karim Baghery, Behzad Abdolmaleki |
|
Volume 2, Issue 3, July 2013 |
Security Architecture for Advanced Metering Infrastructure |
Abstract
PDF
|
Seongho Ju, Moonsuk Choi, Chunghyo Kim, Yonghun Lim |
|
Volume 4, Issue 3, May 2015 |
Security, Privacy Awareness vs. Utilization of Social Networks and Mobile Apps for Learning: Students` Preparedness |
Abstract
PDF
|
Daniel Koloseni |
|
Volume 2, Issue 2, May 2013 |
Security-Aware Dispatching of Virtual Machines in Cloud Environment |
Abstract
PDF
|
Mohammad Amin Keshtkar, Seyed Mohammad Ghoreyshi, Saman Zad Tootaghaj |
|
Volume 4, Issue 6, November 2015 |
Select the most relevant input parameters using WEKA for models forecast Solar radiation based on Artificial Neural Networks |
Abstract
PDF
|
Somaieh Ayalvary, Zohreh Jahani, Morteza Babazadeh |
|
Volume 1, Issue 1, September 2012 |
Semantic Enterprise Optimizer and Coexistence of Data Models |
Abstract
PDF
|
P. A. Sundararajan, Anupama Nithyanand, S.V. Subrahmanya |
|
Volume 2, Issue 1, January 2013 |
Service Registry: A Key Piece for Enhancing Reuse in SOA |
Abstract
PDF
|
Juan Pablo García-González1, Verónica Gacitúa-Décar2, Dr. Claus Pahl3 |
|
276 - 300 of 346 Items |
<< < 7 8 9 10 11 12 13 14 > >> |