Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Message"

ADD TO MY LIST
 
Using Partial Reconfiguration and Message Passing to Enable FPGA-Based Generic Computing Platforms

Author(s): Manuel Saldaña | Arun Patel | Hao Jun Liu | Paul Chow
Effect of Sensor Mobility and Channel Fading on Wireless Sensor Network Clustering Algorithms

Author(s): Ahmed H. Gabr | Sherif Keshk | Aliaa A. A. Youssif
L’ESPACE DU REFUGE EN SOI DE JACQUES IZOARD

Author(s): Camelia Manolescu
Securing Bandwidth Request Messages in Wimax

Author(s): Kaushik Adhikary | Rajinder Kumar | Amit Kumar
A Block Cipher Using Graph Structures and Logical XOR Operation

Author(s): CH. Suneetha | D. Sravan Kumar | A.Chandra sekhar
An approach for a Standard Polynomial for Cyclic Redundancy Check

Author(s): Hasan Md. Mohtarim | Ayesha Zaman | Nowrin Hoque
Using Short Message Service (SMS) to Support Business Continuit

Author(s): Maher Abdel-qade | Ahmad AL-Jaber | .Alaa AL-Hamami
API de Servicios para Dispositivos Móviles

Author(s): José Antonio Plá Rodríguez | Darien Jesús Álvarez de la Cruz | Lex Karel Zayas Hernández | Damián Ilizástegui Arriba | Yanisleydi Lopez Cabrera | Denys Buedo Hidalgo | Yunisel Viera Vargas
Mobile Node Localization in Cellular Networks

Author(s): Yasir Malik | Kishwer Abdul Khaliq | Bessam Abdulrazak | Usman Tariq
Message from the Editor-in-Chief

Author(s): Prabhas Chongstitvattana
Message from the Editor-in-Chief

Author(s): Prabhas Chongstitvattana
Message from the Editor-in-Chief

Author(s): Prabhas Chongstitvattana
“A Flaw in the Model … that Defines How the World Works”

Author(s): Volker Bieta | Hellmuth Milde | Nadine Marianne Weber
New advertising formats: advergames as a marketing communication tool

Author(s): José Martí Parreño | Rafael Currás Pérez | Isabel Sánchez García
The Handheld Library: Developments at the Rector Gabriel Ferraté Library, UPC

Author(s): Beatriz Benítez Juan | Javier Clavero Campos | Miquel Codina Vila | Andrés Pérez Gálvez
Power Managment of Cell Sites

Author(s): R.Surendra | B.Karunaiah | Murali Mohan K V
Using the social marketing model to reduce risky driving behaviors among taxi drivers in Tehran

Author(s): Reza Majdzadeh | Arash Rashidian | Mohsen Shams | Davood Shojaeizadeh | Ali Montazeri
Analysis and Design of Affine and Hill Cipher

Author(s): Mozhgan Mokhtari | Hassan Naraghi
JPEG Steganography System with Minimal Changes to the Quantized DCT Coefficients

Author(s): Hamdy A. Morsy | Zaki B. Nossair | Alaa M. Hamdy | Fathy Z. Amer
ENCRYPTIONS OF DATA STREAMS USING PAULI SPIN ½ MATRICES AND FINITE STATE MACHINE

Author(s): B. Krishna Gandhi | A. Chandra Sekhar | S. Sri lakshmi
Synchronized Communication in Low Power WBAN

Author(s): Nathirulla Sheriff | Naveed Nawaz
Consumer Attitudes toward SMS Advertising among Jordanian Users

Author(s): Abdulraheem M. Ahmad Zabadi | Mohammad Shura | E. A. Elsayed
ZIGBEE Based Voice Control System for Smart Home

Author(s): Y. Bala Krishna | S. Nagendram
Design of Digital Signature Algorithm by Fractals and Chaos Theory

Author(s): Dr. G. Geetha | K. Thamizhchelvy
Visual cryptography for color images by dithering techniques

Author(s): Lakshmi Priya Tadiboyna | M. Deena Babu
Severity of Rotavirus Diarrhea in Children: One Year Experience in a Children Hospital of Bangladesh

Author(s): Selim Ahmed | ARM Luthful Kabir | Aminur Rahman | Maleeha Hussain | Soofia Khatoon | Abdul Hannan
Utilization Asterisk for Service Desk

Author(s): Jiri Vychodil | Karel Tomala | Miroslav Voznak
Common Protocol for Distributed Network File System

Author(s): Peter Peniak | Fedor Kallay
Technology of Electronic Signatur

Author(s): Ladislav Schwartz | Dusan Trstensky | Jaroslav Sadovsky
Hashing of Message Hashing of Message

Author(s): Ladislav Schwartz | Dusan Trstensky
Route Discovery by Cross Layer Approach for MANET

Author(s): Mehajabeen Fatima | Roopam Gupta | T.K. Bandhopadhyay
Hardware Architecture for a Message Hiding Algorithm with Novel Randomizers

Author(s): Saeed Mahmoudpour | Sattar Mirzakuchaki
A New Approach 160-bit Message Digest Algorithm

Author(s): Priteshwar Nath Sallam | Jitendra Agrawal | Santosh Sahu
A New Secure Multicast Key Distribution Scheme Using Tabulation Method

Author(s): R. Varalakshmi | V. Rhymend Uthariaraj
Efficient & Secure Data Hiding Using Secret Reference Matrix

Author(s): Laxman Tawade | Rajshree Mahajan | Chandan Kulthe
Risks and Remedies in E-Learning System

Author(s): Nikhilesh Barik | Sunil Karforma
Cooperative Communications: A New Trend in the Wireless World

Author(s): Gordhan Das Menghwar | Akhtar Ali Jalbani | Mukhtiar Memon | Mansoor Hyder
An Efficient Method of Steganography using Matrix Approach

Author(s): Nirmalya Chowdhury | Puspita Manna
THE ROLE AND IMPLICATIONS OF THE EVENT BASED COMMUNICATION IN THE ELECTORAL CAMPAIGN

Author(s): Tatu Cristian Ionut | Pastiea Mihai | Ion Andrei
SEGMENTING THE U.S.A. NON-TRAVEL MARKET

Author(s): Wayne W. Smith | Emily Fralinger | Stephen W. Litvin
Enhancing Hash Function Selection Techniques Based on Message Contents

Author(s): Ali Saeed | Muhammad Khalil Shahid
Controlling God in The UK: The Vexed Question of Political Accountability and Faith-Based Groups

Author(s): Adrian Barton | Nick Johns | Mark Hyde | Alison Green | Greta Squire
A Hybrid Approach for Security Enhancement by Compressed Crypto-Stegno Scheme

Author(s): G. Manikandan | N. Sairam | M. Kamarasan
Data Hiding in JPEG Images

Author(s): S. K. Muttoo | Sushil Kumar
Semantic Massage Addressing based on Social Cloud Actor's Interests

Author(s): Reem M. Bahgat | Akram I. Salah | Hamada I. Abdul Wakeil
A Micro-Mobility Management Scheme for Handover and Roaming

Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra
Quality and Distortion Evaluation of Audio Signal by Spectrum

Author(s): Er. Niranjan Singh | Dr. Bhupendra Verma
Text Realization Image Steganography

Author(s): Dr. Mohammed Nasser Hussein Al-Turfi
TRACKING OF INTRUDERS ON GEOGRAPHICAL MAP USING IDS ALERT

Author(s): Manish Kumar | M. Hanumanthappa | T.V. Suresh Kumar
Developing Fault-Tolerant Heuristic Routing Algorithm Using Ant Colonies in Mesh Networks

Author(s): Alireza Shams Shafigh | Hekmat Mohammadzadeh | Alireza Soleimany | Shahriyar Lotfi
Developing Fault-Tolerant Heuristic Routing Algorithm Using Ant Colonies in Mesh Networks

Author(s): Alireza Shams Shafigh | Hekmat Mohammadzadeh | Alireza Soleimany | Shahriyar Lotfi
Moderating Effects of Consumer Involvement and the Need for Cognition on Goal Framing

Author(s): Leandro Miletto Tonetto | Lilian Milnitsky Stein
Watermarking Schemes For Copy Protection : A Survey

Author(s): Dolley Shukla | Manisha Sharma
QUALITATIVE OBSERVATION APPLIED IN PROMOTIONAL STRATEGY DESIGN

Author(s): Adriana MANOLICĂ | Claudia BOBÂLCĂ | Oana CIOBANU
InfiniBand: A New Era in Networking

Author(s): Vivek D. Deshmukh
Real Time Speech to Text Converter for Mobile Users

Author(s): Anuja Jadhav | Arvind Patil
Security issues in Cloud Computing

Author(s): Kalyani D. Kadam | Sonia K. Gajre | R. L. Paikrao
A Cooperative Mac For Energy Efficient Relying

Author(s): Darshana N. Tambe | Priya N. Tambe
A Comparative study for approaches for Hand Sign Language

Author(s): Pravin R. Futane | R.V. Dharaskar | V. M. Thakare
Image Stenography Skin Tone Detection

Author(s): DEEPALI BHAMARE | VIKAS GUPTA | P.B.SALUNKHE
An Adult Site Access Verification System for Non-Adults

Author(s): Shalini Puri | Sona Kaushik
Survey of MAC Layer Protocols for vehicular Ad Hoc Network

Author(s): Vimal Bibhu | Dhirendra Kumar Singh
Interfacing of Sensor Network to Communication Network for Disaster Management

Author(s): Sanjay Patel | O. P. Vyas | Hansa Mehra
An Approach for SMS Security using Authentication Functions

Author(s): Neetesh Saxena | Narendra S. Chaudhari
Analyzing Digital Signature Robustness with Message Digest Algorithms

Author(s): Rubina B. Patel | Naveen Chaudhary
Affiliate Program      Why do you need a reservation system?