Browse Title Index


 
Issue Title
 
Volume 2, Issue 5, November 2013 Prolonging sensor networks lifetime using convex clusters Abstract   PDF
Payam Salehi, Mohammad Ebrahim Shiri Ahmad Abadi
 
Volume 2, Issue 2, May 2013 Proposed New Mechanism to Detect and Defend the Malicious Attackers in AODV Abstract   PDF
Vijay Kumar, Ashwani Kush
 
Volume 5, Issue 1, January 2016 Provable Data Possession Scheme based on Homomorphic Hash Function in Cloud Storage Abstract   PDF
Li Yu, Junyao Ye
 
Volume 5, Issue 1, January 2016 Providing a framework to improve the performance of business process management projects based on BPMN Abstract   PDF
Mojtaba Ahmadi, Alireza Nikravanshalmani
 
Volume 4, Issue 1, January 2015 QoS Routing in Multicast Networks Based on Imperialism Competition Algorithm Abstract   PDF
Parisa Mollamohammada, Abolfazl Toroghi Haghighat
 
Volume 4, Issue 1, January 2015 Ranking the technical dimensions of e-banking service quality evaluation models using Analytical Hierarchy Process Abstract   PDF
NoorMohammad Yaghubi, Seyed Morteza Seyedin
 
Volume 5, Issue 1, January 2016 Ranking user’s comments by use of proposed weighting method Abstract   PDF
zahra hariri
 
Volume 2, Issue 5, November 2013 Real-Time and Robust Method for Hand Gesture Recognition System Based on Cross-Correlation Coefficient Abstract   PDF
Reza Azad, Babak Azad, Iman tavakoli kazerooni
 
Volume 5, Issue 1, January 2016 Real-Time Color Coded Object Detection Using a Modular Computer Vision Library Abstract   PDF
Antonio J. R. Neves, Alina Trifan, Bernardo Cunha, José Luís Azevedo
 
Volume 4, Issue 2, March 2015 Recent Digital Watermarking Approaches, Protecting Multimedia Data Ownership Abstract   PDF
Siddarth Gupta, Vagesh Porwal
 
Volume 3, Issue 2, March 2014 Reducing Energy Consumption in Mobile ad hoc Networks Using Energy-aware Routing Algorithm Based on Multiple Routes Abstract   PDF
Ali Broumandnia, Ehsan Sharifi, Milad Ghahari Bidgoli
 
Volume 4, Issue 5, September 2015 Repeat Finding Techniques, Data Structures and Algorithms in DNA sequences: A Survey Abstract   PDF
Freeson Kaniwa, Heiko Schroeder, Otlhapile Dinakenyane
 
Volume 4, Issue 1, January 2015 Representing an Effective Approach to Understand the Dynamic Frequent Pattern of Web Visitor Abstract   PDF
Farid Soleymani Sabzchi, Mehdi Afzali
 
Volume 5, Issue 2, March 2016 Requirements Prioritization: Challenges and Techniques for Quality Software Development Abstract   PDF
Muhammad Abdullah Awais
 
Volume 4, Issue 6, November 2015 Reverse Modeling and Autonomous Extrapolation of RF Threats Abstract   PDF
Sanguk Noh, So Ryoung Park
 
Volume 2, Issue 4, September 2013 Reverse Query Tree approach to cope with Id distribution problem in Tree-based tag anti-collision protocols of RFID Abstract   PDF
Milad HajMirzaei
 
Volume 4, Issue 1, January 2015 Robust flip-flop Redesign for Violation Minimization Considering Hot Carrier Injection (HCI) and Negative Bias Temperature Instability (NBTI) Abstract   PDF
Naeun Zang, Juho Kim
 
Volume 4, Issue 2, March 2015 Robust method for Gaze Recognition Using Histogram Thresholding and Neural Network Abstract   PDF
Maliheh sadat sakhaie, Mahmoud mahlouji, Omid ghahari
 
Volume 3, Issue 5, September 2014 Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Abstract   PDF
Seyed Mohammad Alavi, Karim Baghery, Behzad Abdolmaleki
 
Volume 2, Issue 3, July 2013 Security Architecture for Advanced Metering Infrastructure Abstract   PDF
Seongho Ju, Moonsuk Choi, Chunghyo Kim, Yonghun Lim
 
Volume 4, Issue 3, May 2015 Security, Privacy Awareness vs. Utilization of Social Networks and Mobile Apps for Learning: Students` Preparedness Abstract   PDF
Daniel Koloseni
 
Volume 2, Issue 2, May 2013 Security-Aware Dispatching of Virtual Machines in Cloud Environment Abstract   PDF
Mohammad Amin Keshtkar, Seyed Mohammad Ghoreyshi, Saman Zad Tootaghaj
 
Volume 4, Issue 6, November 2015 Select the most relevant input parameters using WEKA for models forecast Solar radiation based on Artificial Neural Networks Abstract   PDF
Somaieh Ayalvary, Zohreh Jahani, Morteza Babazadeh
 
Volume 1, Issue 1, September 2012 Semantic Enterprise Optimizer and Coexistence of Data Models Abstract   PDF
P. A. Sundararajan, Anupama Nithyanand, S.V. Subrahmanya
 
Volume 2, Issue 1, January 2013 Service Registry: A Key Piece for Enhancing Reuse in SOA Abstract   PDF
Juan Pablo García-González1, Verónica Gacitúa-Décar2, Dr. Claus Pahl3
 
276 - 300 of 346 Items << < 7 8 9 10 11 12 13 14 > >> 


Lululemon Black Friday cheap nfl jerseys Lululemon factory Outlet ny Black Friday discount tiffany outlet wholesale soccer jerseys online oakley black friday cheap nhl jerseys china cheap nfl jerseys north face black friday sale cheap nfl jerseys online Jordans Black Friday Sale 2015 Cheap Moncler Cyber Monday moncler outlet cheap soccer jerseys moncler outlet black friday cheap authentic nfl jerseys north face cyber monday Louboutin Black Friday canada wholesale cheap nfl jerseys lululemon cyber monday 2015 cheap nfl jerseys from china 2015 Cheap Moncler Black Friday Sale Moncler Cyber Monday 2015 cheap jerseys Lululemon Cyber Monday Sale jordans cyber monday deals 2015 Black Friday deals Lululemon 2015 jordan black friday 2015 Moncler Jackets Black Friday Sale 2015 Louboutin Pas Cher Black Friday 2015 Canada Lululemon north face black friday cheap wholesale soccer jerseys