Digit Recognition Based on Specialization, Decomposition and Holistic Processing | 0 | 0.34 | 2020 |
Fault Tolerance Model For Efficient Actor Recovery Paradigm In Wsan | 0 | 0.34 | 2019 |
Vulnerability Analysis and Modeling | 0 | 0.34 | 2019 |
A new Quantum Processor Architecture | 0 | 0.34 | 2019 |
A Novel Obstacle Avoidance System For Guiding The Visually Impaired Through The Use Of Fuzzy Control Logic | 0 | 0.34 | 2018 |
Bad USB MITM: A Network Attack Based on Physical Access and Its Practical Security Solutions. | 0 | 0.34 | 2018 |
Automated Adaptive Mobile Learning System using Shortest Path Algorithm and Learning Style. | 0 | 0.34 | 2018 |
The Art Of Reading Explosion Phenomena: Science And Algorithms | 0 | 0.34 | 2018 |
A Novel Fault Self-Detectable Universal Quantum Reversible Circuits Array Design | 0 | 0.34 | 2018 |
A Highly Accurate Deep Learning Based Approach for Developing Wireless Sensor Network Middleware. | 1 | 0.35 | 2018 |
Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks. | 0 | 0.34 | 2018 |
A highly accurate machine learning approach for developing wireless sensor network middleware | 0 | 0.34 | 2018 |
Iris Print Biometric Identification Using Perceptual Image Hashing Algorithms | 0 | 0.34 | 2018 |
A Highly Accurate and Reliable Data Fusion Framework for Guiding the Visually Impaired. | 0 | 0.34 | 2018 |
A Novel Reversible Four Bit One’s Complement Quantum Gate (OCQG-4B) | 0 | 0.34 | 2018 |
A Shared Secret Key Initiated by EPR Authentication and Qubit Transmission Channels. | 0 | 0.34 | 2017 |
Compressed and raw video steganography techniques: a comprehensive survey and analysis. | 8 | 0.45 | 2017 |
Smart phone application development for monitoring epilepsy seizure detection based on EEG signal classification | 0 | 0.34 | 2017 |
Efficient Actor Recovery Paradigm for Wireless Sensor and Actor Networks. | 2 | 0.38 | 2017 |
An efficient automated technique for epilepsy seizure detection using EEG signals | 0 | 0.34 | 2017 |
Epilepsy seizure detection using EEG signals | 0 | 0.34 | 2017 |
Battery independence: Reducing the dependence on batteries in wearable computing through energy harvesting techniques | 0 | 0.34 | 2017 |
Performance and Challenges of Service-Oriented Architecture for Wireless Sensor Networks. | 8 | 0.50 | 2017 |
A Novel Vision-Based Classification System for Explosion Phenomena. | 0 | 0.34 | 2017 |
A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC. | 4 | 0.43 | 2017 |
Updating Student Profiles in Adaptive Mobile Learning using ASP.net MVC, dotNetRDF, Turtle, and the Semantic Web. | 0 | 0.34 | 2017 |
An Optimal and Energy Efficient Multi-Sensor Collision-Free Path Planning Algorithm for a Mobile Robot in Dynamic Environments. | 1 | 0.49 | 2017 |
Sensor-Based Assistive Devices for Visually-Impaired People: Current Status, Challenges, and Future Directions. | 12 | 0.93 | 2017 |
Deterministic and Efficient Quantum Key Distribution Using Entanglement Parity Bits and Ancillary Qubits. | 0 | 0.34 | 2017 |
A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes | 19 | 0.65 | 2016 |
SSL proxy attacks on mobile devices and their prevention | 1 | 0.48 | 2016 |
An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks. | 1 | 0.35 | 2016 |
Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions. | 0 | 0.34 | 2016 |
A New MAC Address Spoofing Detection Technique Based on Random Forests. | 4 | 0.41 | 2016 |
An Interactive And Self-Instructional Virtual Chemistry Laboratory | 0 | 0.34 | 2016 |
Multi-Layer Approach for the Detection of Selective Forwarding Attacks. | 2 | 0.36 | 2015 |
A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11) | 5 | 0.45 | 2015 |
A highly efficient and secure shared key for direct communications based on quantum channel | 0 | 0.34 | 2015 |
A New Video Steganography Algorithm Based on the Multiple Object Tracking and Hamming Codes | 2 | 0.36 | 2015 |
Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks | 6 | 0.59 | 2015 |
Secure Data Aggregation Model (SDAM) in Wireless Sensor Networks | 0 | 0.34 | 2015 |
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis | 14 | 0.63 | 2015 |
Low Duty Cycle, Energy-Efficient and Mobility-Based Boarder Node—MAC Hybrid Protocol for Wireless Sensor Networks | 8 | 0.54 | 2015 |
Fostering of innovative usability testing to develop mobile application for mobile collaborative learning (MCL). | 0 | 0.34 | 2014 |
Simulation based Study of TCP Variants in Hybrid Network. | 1 | 0.35 | 2014 |
Secure and efficient key management protocol (SEKMP) for wireless sensor networks | 1 | 0.36 | 2014 |
Energy-efficient boarder node medium access control protocol for wireless sensor networks. | 22 | 0.86 | 2014 |
Dynamic Cluster Head Node Election (DCHNE) Model over Wireless Sensor Networks (WSNs). | 1 | 0.39 | 2014 |
Restoring the privacy and confidentiality of users over Mobile collaborative learning (MCL) environment. | 0 | 0.34 | 2013 |
Automatic energy saving (AES) modelto boost ubiquitous wireless sensor networks (WSNs). | 5 | 0.58 | 2013 |