nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Active Contours without Edges and Curvature Analysis for Endoscopic Image Classification
|
B. V. Dhandra |
|
2007 |
|
1 |
p. 19-32 |
artikel |
2 |
A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network
|
Pankaj Kumar Sehgal |
|
2009 |
|
1 |
p. 16-22 |
artikel |
3 |
A Multi-Operator Based Simulated Annealing Approach For Robot Navigation in Uncertain Environments
|
Hui Miao |
|
2010 |
|
1 |
p. 50-61 |
artikel |
4 |
Analysis & Integrated Modeling of the Performance Evaluation Techniques for Evaluating Parallel Systems
|
Amit Chhabra |
|
2007 |
|
1 |
p. 1-10 |
artikel |
5 |
An Ant Algorithm for Solving QoS Multicast Routing Problem
|
Ahmed Younes Hamed |
|
2011 |
|
1 |
p. 156-167 |
artikel |
6 |
A Novel Mathematical Based Method for Generating Virtual Samples from a Frontal 2D Face Image for Single Training Sample Face Recognition
|
Reza Ebrahimpour, Masoom Nazari, Mehdi Azizi, Mahdieh Rezvan |
|
2011 |
|
1 |
p. 64-71 |
artikel |
7 |
A Novel Secure Key Agreement Protocol using Trusted Third Party
|
Sairam Kulkarni |
|
2007 |
|
1 |
p. 11-18 |
artikel |
8 |
A REVIEW OF STUDIES ON MACHINE LEARNING TECHNIQUES
|
Yogesh Singh |
|
2007 |
|
1 |
p. 70-84 |
artikel |
9 |
A REVIEW PAPER ON AD HOC NETWORK SECURITY
|
Karan Singh |
|
2007 |
|
1 |
p. 52-69 |
artikel |
10 |
Asking Users: A Continuous Evaluation on Systems in a Controlled Environment
|
Dayang Rohaya Awang Rambli |
|
2009 |
|
1 |
p. 34-42 |
artikel |
11 |
A Survey on MANET Intrusion Detection
|
Satria Mandala |
|
2008 |
|
1 |
p. 1-11 |
artikel |
12 |
Authentication and Authorization Models
|
More V.N |
|
2011 |
|
1 |
p. 72-84 |
artikel |
13 |
Car-Following Parameters by Means of Cellular Automata in the Case of Evacuation
|
Kohei Arai, Tri Harsono & Achmad Basuki |
|
2011 |
|
1 |
p. 28-38 |
artikel |
14 |
Detecting and preventing attacks using network intrusion detection systems
|
MeeraGandhi |
|
2008 |
|
1 |
p. 49-58 |
artikel |
15 |
Development of Predictor for Sequence Derived Features From Amino Acid Sequence Using Associate Rule Mining
|
Manpreet Singh, Gurvinder Singh |
|
2011 |
|
1 |
p. 14-27 |
artikel |
16 |
Diacritic Oriented Arabic Information Retrieval System
|
Khalid Saleh Aloufi |
|
2011 |
|
1 |
p. 143-155 |
artikel |
17 |
Exploring Knowledge for a Common Man through Mobile Services and Knowledge Discovery in Databases
|
Mayank Dave |
|
2009 |
|
1 |
p. 43-61 |
artikel |
18 |
GPS-less Localization Protocol for Underwater Acoustic Networks
|
Al-Khalid Othman |
|
2008 |
|
1 |
p. 34-48 |
artikel |
19 |
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
|
B.Umaprasada Rao & P.Vasudeva Reddy |
|
2011 |
|
1 |
p. 107-117 |
artikel |
20 |
Image Recognition With the Help of Auto-Associative Neural Network
|
Moumi Pandit, Mousumi Gupta |
|
2011 |
|
1 |
p. 54-63 |
artikel |
21 |
IMPLEMENTATION OF ECHOSTATE NETWORK IN NIDS
|
Meera Gandhi |
|
2008 |
|
1 |
p. 73-86 |
artikel |
22 |
Implementation of Radial Basis Function Neural Network for Image Steganalysis
|
Sambasiva Rao Baragada |
|
2008 |
|
1 |
p. 12-22 |
artikel |
23 |
Information Technology (IT) Security Framework for Kenyan Small and Medium Enterprises (SMEs)
|
Michael Kimwele, Waweru Mwangi, Stephen Kimani |
|
2011 |
|
1 |
p. 39-53 |
artikel |
24 |
Integration of Least Recently Used Algorithm and Neuro-Fuzzy System into Client-side Web Caching
|
Siti Mariyam Shamsuddin |
|
2009 |
|
1 |
p. 1-15 |
artikel |
25 |
MMI Diversity Based Text Summarization
|
Ladda Suanmali |
|
2009 |
|
1 |
p. 23-33 |
artikel |
26 |
Morphological Reconstruction for Word Level Script Identification
|
B.V.Dhandra |
|
2007 |
|
1 |
p. 41-51 |
artikel |
27 |
On the use of continued fractions for electronic cash
|
Amadou Moctar Kane |
|
2010 |
|
1 |
p. 136-148 |
artikel |
28 |
RB-GDM: A Role-Based Grid Delegation Model
|
G Geethakumari |
|
2008 |
|
1 |
p. 61-72 |
artikel |
29 |
Recognition of Non-Compound Handwritten Devnagari Characters using a Combination of MLP and Minimum Edit Distance
|
S. Arora, D. Bhattacharjee, M. Nasipuri, D. K. Basu & M. Kundu |
|
2010 |
|
1 |
p. 107-120 |
artikel |
30 |
Secure E-Commerce Protocol
|
Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin |
|
2011 |
|
1 |
p. 132-142 |
artikel |
31 |
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile Agents
|
Nirmala C R & V.Ramaswamy |
|
2011 |
|
1 |
p. 98-106 |
artikel |
32 |
Security Model for Hierarchical Clustered Wireless Sensor Networks
|
Kalpana Sharma, S. K. Ghosh, M.K. Ghose |
|
2011 |
|
1 |
p. 85-97 |
artikel |
33 |
Segmentation of Malay Syllables in Connected Digit Speech Using Statistical Approach
|
M-S Salam |
|
2008 |
|
1 |
p. 23-33 |
artikel |
34 |
Simple Encryption/Decryption Application
|
Majdi Al-qdah |
|
2007 |
|
1 |
p. 33-40 |
artikel |
35 |
Stream Processing Environmental Applications in Jordan Valley
|
Iyad Ahmad Aldasouqi, Jalal Atoum |
|
2011 |
|
1 |
p. 1-13 |
artikel |
36 |
Systematic Digital Forensic Investigation Model
|
Systematic Digital Forensic Investigation Model |
|
2011 |
|
1 |
p. 118-131 |
artikel |
37 |
Texting satisfaction: does age and gender make a difference?
|
Vimala Balakrishnan |
|
2007 |
|
1 |
p. 85-96 |
artikel |