Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Individual Security"

A Bidding based Resource Allocation Scheme in WiMAX

Author(s): Mahasweta Sarkar, Padmasini Chandramouli
A Learning-Based Steganalytic Method against LSB Matching Steganography

Author(s): Z. Xia | L. Yang | X. Sun | W. Liang | D. Sun | Z. Ruan
Comparative and Analysis of Biometric Systems

Author(s): Manivannan, | Padma
IDDP: Novel Development of an Intrusion Detection System through Design Patterns

Author(s): Rajshekhar M Patil | Mamithar. R. Patil | Dr. K V. Ramakrishnan | Dr. T.C.Manjunath
Design of the Storage Battery Online Monitoring System

Author(s): Juan Tian | Cheng Wang | Xixue Zhang
Lossy Image Compression For Multi Application Smart Card

Author(s): L.M. Palanivelu | Dr. P. Vijayakumar
Pattern Recognition Using Neural Networks

Author(s): Santaji Ghorpade | Jayshree Ghorpade | Shamla Mantri
Integration of an RFID Reader to a Wireless Sensor Network and its use to Identify an Individual Carrying RFID Tags

Author(s): Bolivar Torres | Qing Pang | Gordon W. Skelton | Scott Bridges | Natarajan Meghanathan
Social insurance medicine in Romania

Author(s): Oancea C | Tudorache LD | Ciuvica MM

Author(s): GRISALES ROMERO Hugo | Arbelaez Maria Patricia
Securing Web Services By Iris Recognition System

Author(s): Bava Elizabeth Mathew

Author(s): TECULESCU Silviu Alexandru
Development of a Project-Based Learning Approach in Requirement Engineering

Author(s): Nor Azliana Akmal Jamaludin | Shamsul Sahibuddin | Kamaruzaman Jusoff | Nur Hafizah Hidayat
East Asian Welfare Regimes 東アジア福祉制度

Author(s): Andrew DeWit | Ito Peng | Joseph Wong
Can Quality of Work Life Affect Work Performance among Government Agriculture Extension Officers? A Case from Malaysia

Author(s): O. Jamilah | M. S.H. Azril | U. Jegak | M. Asiah | A. N. Azman | A. S.   Bahaman | K. Thomas
CADS: Co-operative Anti-fraud Data Storage Scheme for Unattended Wireless Sensor Networks

Author(s): Zhiqiang Ruan | Xingming Sun | Wei Liang | Decai Sun | Zhihua Xia
Web Services Security Architectures Composition and Contract Design using RBAC

Author(s): D.Shravani | Dr.P.Suresh Varma | Dr.B.Padmaja Rani, | , Dr.D.Sravan Kumar, | M.Upendra Kumar
Changes in everyday life after discharge from day care rehabilitation

Author(s): Anita Tollén | Kitty Kamwendo | Ann-Britt Ivarsson
An Evaluation of Vocational Self-Esteem and Job Satisfaction of Primary School Teachers

Author(s): Nuri BALOĞLU | Engin KARADAĞ | Nihat ÇALIŞKAN | Tuğba KORKMAZ
Food Relocalization for Environmental Sustainability in Cumbria

Author(s): Les Levidow | Katerina Psarikidou
Retinal Biometrics based Authentication and Key Exchange System

Author(s): K. Saraswathi | B. Jayaram | R. Balasubramanian
A Meta Analysis on Farm-Level Costs and Benefits of GM Crops

Author(s): Robert Finger | Nadja El Benni | Timo Kaphengst | Clive Evans | Sophie Herbert | Bernard Lehmann | Stephen Morse | Nataliya Stupak
The Internet Inter-Orb Protocol Security Bridge

Author(s): Pawel Pietras | Pawel Slowikowski
Access Control Via Biometric Authentication System

Author(s): Okumbor Anthony N. | S. C. Chiemeke
Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks

Author(s): Mohamed Hamdy Eldefrawy | Muhammad Khurram Khan | Khaled Alghathbar | Ahmed Saleh Tolba | Kyngn Jung Kim
Human Security: A Normative Perspective

Author(s): Bogdan Stefanachi
Globalization, Development and Human Security

Author(s): Bogdan Ștefanachi

Author(s): Sushma Jaiswal | Dr. Sarita Singh Bhadauria | Dr.Rakesh Singh Jadon
Tax Security: Essence and Conditions of its Provision

Author(s): Yu. Ivanov | Yu. Berezhna
Experimentation in an Academic Library: A Study in Security and Individual Student Engagement

Author(s): Susan Marie Burns Steuer | Matthew Thornton Brodhead
Black Hole Detection in MANET Using AODV Routing Protocol

Author(s): Govind Sharma | Manish Gupta
A Session Based Multiple Image Hiding Technique using DWT and DCT

Author(s): Tanmay Bhattacharya | Nilanjan Dey | S. R. Bhadra Chaudhuri
Policy, Perception and Health Care Utilization in Myanmar

Author(s): Soe Moe | Daw Khin Saw Naing

Author(s): Joanna KOSSEWSKA
Semantic Massage Addressing based on Social Cloud Actor's Interests

Author(s): Reem M. Bahgat | Akram I. Salah | Hamada I. Abdul Wakeil
Evaluation of Electrocardiogram for Biometric Authentication

Author(s): S K Singh | Yogendra Narain Singh
Personnel Security outside the Box

Author(s): Sergey Yesin | Semyon Ioffe
Personnel Security outside the Box

Author(s): Sergey Yesin | Semyon Ioffe
A Novel Approach for Iris Encryption

Author(s): Shrinivasrao B. Kulkarni | Ravindra S. Hegadi | Umakant P. Kulkarni
Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Author(s): Prasad Patil | Rinku Shah | Kajal Jewani
Τhe concept of need as a dynamic alternating phenomenon

Author(s): Ifigenia Kotsagiorgi | Basiliki Limperi
Estudos sobre as condições de risco a que os profissionais da área de radiologia médica estão sujeitos

Author(s): Sérgio Ricardo Lourenço | Thadeu Alfredo Farias Silva | Silvério Catureba da Silva Filho
Security Conformance for the Dynamically Routed Data

Author(s): Suma Patra | Dr.V.Janaki | Priyanka suram | Nalubala Ranjeeth Kumar
A Study on Cyber Crimes and protection

Author(s): Loganathan M | Dr.E.Kirubakaran
Hierarchial key management scheme in mobile ad hoc networks

Author(s): M.Poongodi | L.Manjula | S.Pradeepkumar
On the transmission capacity of quantum networks

Author(s): Sandra König | Stefan Rass
Mobility Network and Safety Mobility Network and Safety

Author(s): Adriana Galderisi | Andrea Ceudech
Anomalous Network Packet Detection Using Data Stream Mining

Author(s): Zachary Miller | William Deitrick | Wei Hu
Mathematical Models of the Sinusoidal Screen Family

Author(s): Tajana Koren | Vilko Žiljak | Maja Rudolf | Nikolina Stanić-Loknar | Aleksandra Bernašek
Compression Independent Reversible Encryption for Privacy in Video Surveillance

Author(s): Carrillo Paula | Kalva Hari | Magliveras Spyros
Unconstrained Iris Acquisition and Recognition Using COTS PTZ Camera

Author(s): Venugopalan Shreyas | Savvides Marios
A proposed Solution: Data Availability and Error Correction in Cloud Computing

Author(s): Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma

Author(s): Ochin Sharma | Ameen Yasar Khan

Author(s): Dhara Buch | Devesh Jinwala
Securing Retinal Template Using Quasigroups

Author(s): N. Radha | T. Rubya | S. Karthikeyan
Guest Editorial

Author(s): Feng Gao | Bin Wang | Deyun Yang | Junhu Zhang | Shifei Ding
Guest Editorial

Author(s): Feng Gao | Bin Wang | Deyun Yang | Junhu Zhang | Shifei Ding
Guest Editorial

Author(s): Hsing-Chung Chen | Franz I.S. Ko | Yung-Chen Chou | Shyan-Ming Yuan | Yaw-Chung Chen | Chin-Chen Chang | Jyh-Horng Wen | Shiuh-Jeng Wang | Yuh-Ren Tsai | Keh-Ming Lu
Guest Editorial

Author(s): Syed Mahfuzul Aziz | Vijayan K. Asari | M. Alamgir Hossain | Mohammad Ataul Karim | Mariofanna Milanova
Network Intrusion Detection using Support Vector Regression

Author(s): Govindarajan Muthukumarasamy
A Combined Method for Finger Vein Authentication System

Author(s): Azadeh Noori Hoshyar | Ir.Riza Sulaiman | Afsaneh Noori Hoshyar
A New IRIS Normalization Process For Recognition System With Cryptographic Techniques

Author(s): S Nithyanandam | K S Gayathri | P L K Priyadarsini
Vulnerabilities of Electronics Communication: solution mechanism through script

Author(s): Arun Kumar Singh | Pooja Tewari | Shefalika Ghosh Samaddar | Arun K Misra
Iris Image Pre-Processing and Minutiae Points Extraction

Author(s): Archana R. C. | J. Naveenkumar | Suhas.H.Patil
Comparison of user groups' perspectives of barriers and facilitators to implementing electronic health records: a systematic review

Author(s): McGinn Carrie | Grenier Sonya | Duplantie Julie | Shaw Nicola | Sicotte Claude | Mathieu Luc | Leduc Yvan | Légaré France | Gagnon Marie-Pierre
Psychiatry out-of-hours: a focus group study of GPs' experiences in Norwegian casualty clinics

Author(s): Johansen Ingrid | Carlsen Benedicte | Hunskaar Steinar
Iris Recognition based on Wavelets

Author(s): S V Sheela | P A Vijaya
Modeling and Analyze the Deep Web: Surfacing Hidden Value

Author(s): Suneet Kumar | Anuj Kumar Yadav | Rakesh Bharati | Rani Choudhary
EU Integration and Harmonisation of Personal Income Taxation

Author(s): Tomasz Wołowiec | Janusz Soboń
Hybrid Technique For Secure Sum Protocol

Author(s): Priyanka Jangde | Gajendra Singh Chandel | Durgesh Kumar Mishra
Performance Comparison of Robust Steganography Based on Multiple Transformation Techniques

Author(s): K B Shiva Kumar | K B Raja | R K Chhotaray | Sabyasachi Pattnaik
Alternative Threat Methodology

Author(s): Charles B. King III
Accurate And Efficient Crawling The Deep Web: Surfacing Hidden Value

Author(s): Suneet Kumar | Anuj Kumar Yadav | Rakesh Bharti | Rani Choudhary
Strategic Approach for Automatic Text Summarization

Author(s): Ramesh Vaishya | Surya Prakash Tripathi
How Insecurity impacts on school attendance and school drop out among urban slum children in Nairobi

Author(s): Netsayi N. Mudege | Eliya M. Zulu | Chimaraoke Izugbara
Affiliate Program     

Tango Jona
Tangokurs Rapperswil-Jona