Review of Name Resolution and Data Routing for Information Centric Networking 1452 Views
This paper provides a classification and review of the routing mechanisms that are proposed on six ICN architectures.
|
Review of Name Resolution and Data Routing for Information Centric Networking 963 Views
This paper provides a classification and review of the routing mechanisms that are proposed on six ICN architectures.
|
Performance Evaluation of TCP, UDP and DCCP Traffic over 4G Network 1682 Views
This study tries to evaluate if the old protocols suit with this new technology.
|
Using Abstraction Methods to Improve String Matching Algorithms 1384 Views
All the work relies on of how enhance the time matching to be efficient.
|
Detection of Harmful Insects Based on Gray-Level Cooccurrence Matrix (GLCM) in Rural Areas 1329 Views
The main idea shows that a tested image is composed of different texture regions of the insect and this will help to extract feature value.
|
A Cloud-Based Encryption for Document Storage Using Salesforce.com 1236 Views
Security in Cloud Computing
|
Web Documents Similarity Using K-Shingle Tokens and MinHash Technique 1080 Views
Document similarity
|
High Security Steganography Model Based on DWT, DCT and RSA 1264 Views
The steganography is the science of concealing secret information in media files (i.e., image, text, audio, etc.), so that, such information is not noticeable by the eavesdropper.
|
Arabic Characters Identification Depending on Extracted Features of the Projection-Based Segmentation 1223 Views
In this paper a developed a techniques to detect the skew angle and using different descriptors to recognize the Arabic characters and comparing the accuracy of each one
|
Robust Authentication Approach Based on Keyboard Graphical Password 1028 Views
Now a days, it is fairly clear that the curve of challenges of authorized access has been increased sharply.
|
Data Encryption Scale for Large Data Scale in Cloud Computing 1039 Views
Cloud computing is a power full platform to deliver applications over the internet or a private network. It considers the next technology in data manipulating and retrieving.
|
Meaning Extension of the Word ‘Sight’ 1022 Views
it is an analysis of the metaphoric , metonymic extension of the word sight
|
Unified Strategy for Intensification and Diversification Balance in ACO Metaheuristic 1015 Views
Proposed new optimization approach
|
An Efficient Steganography Model Using Video Compression and Image Steganography 1893 Views
A process of hiding the secret information in the cover media (i.e. image, audio, video, etc.) is called as Steganography
|
Automatic Facial Expression Recognition Based on Hybrid Approach 1670 Views
The topic of automatic recognition of facial expressions deduce a lot of researchers in the late last century and has increased a great interest in the past few years
|
Design and Implementation of Python Program to Show a new mathematical miracles of Holy Quran by using Arithmetic Analysis Method 2014 Views
this paper was published in Medwell Journals, 2016
|
Software package to implement operations on the permutation 1647 Views
The Forth Scientific Conference of the College of Science University of Kerbala 2016 Journal of University of Kerbala
|
STUDY OF CHEMICAL ANALYSIS OF IRAQI PROPOLIS AND ACTIVE COMPONENT OF PROPLIS, IRAQ 1942 Views
this paper was published in Journal of Science / Vol5 / Issue 11 / 2015 / 1095-1103.
|
IMPLEMANTATION OF FUSION MODEL TO RE-ENGINEER LEGACY SOFTWARE 1717 Views
this paper was published in International Journal of Computer Science and Engineering (IJCSE) ISSN 2278-9960 Vol. 2, Issue 2, May 2013, 53-64 © IASET
|
Proposed Software Re-engineering Process That Combine Traditinal Software Reengineering Process With Spiral Model 2012 Views
this paper was published in International Journal of Advanced Research in Computer Science Volume 4, No. 2, Jan-Feb 2013
|