Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "critical infrastructure"

ADD TO MY LIST
 
A Study on Email Spam Filtering Techniques

Author(s): Christina V | Karpagavalli S | Suganya G
An empirical study to determine the critical success factors of export industry

Author(s): Masoud Babakhani | Hosein Ali Alizadeh Haji
Evaluation of Critical Success Factors for Telemedicine Implementation

Author(s): Subrahmanyam Kodukula | Mariyam Nazvia
Cyberterrorism: The Next Arena of Confrontation

Author(s): George K. Kostopoulos
Unicast Position-based Routing Protocols for Ad-Hoc Networks

Author(s): Miss Laiha Mat Kiah | Liana Khamis Qabajeh | Mohammad Moustafa Qabajeh
FAULT TOLERANT SCHEDULING STRATEGY FOR COMPUTATIONAL GRID ENVIRONMENT

Author(s): MALARVIZHI NANDAGOPAL, | V. RHYMEND UTHARIARAJ
Analyzing the Usage of IT in SMEs

Author(s): Sona Mardikyan
Power Management in Mobile Adhoc Network

Author(s): Sunil Taneja | Ashwani Kush | Amandeep Makkar | Bharat Bhushan
A cell spot microarray method for production of high density siRNA transfection microarrays

Author(s): Rantala Juha | Mäkelä Rami | Aaltola Anna-Riina | Laasola Petra | Mpindi John-Patrick | Nees Matthias | Saviranta Petri | Kallioniemi Olli
Training resources and e-Government services for rural SMEs: the rural inclusion platform

Author(s): Pantelis Karamolegkos | Axel Maroudas | Nikos Manouselis
Time Synchronization in Wireless Sensor Networks: A Survey

Author(s): Prakash Ranganathan | Kendall Nygard
Perfect Forward Secrecy of Authentication and Key Exchange Protocols in Three Versions of WAPI

Author(s): Chun-Jie Cao | Chao Yang | Xing-Hua Li | Yuan Bo Guo | Jian Feng Ma
Feasibility and Critical Success Factors in Implementing Telemedicine

Author(s): H.M. Judi | A.A. Razak | N. Sha`ari | H. Mohamed
Vegetation of the Hantam-Tanqua-Roggeveld subregion, South Africa. Part 1: Fynbos Biome related vegetation

Author(s): Helga van der Merwe | Margaretha W. van Rooyen | Noel van Rooyen
From Editor vol 11, No.4

Author(s): Ugur Demiray
SeqAnt: A web service to rapidly identify and annotate DNA sequence variations

Author(s): Shetty Amol | Athri Prashanth | Mondal Kajari | Horner Vanessa | Steinberg Karyn | Patel Viren | Caspary Tamara | Cutler David | Zwick Michael
Improved Computer Networks resilience Using Social Behavior

Author(s): Yehia H. Khalil | Walaa M. Sheta | Adel S. Elmaghraby
Building capacity for public and population health research in Africa: the consortium for advanced research training in Africa (CARTA) model

Author(s): Alex C. Ezeh | Chimaraoke O. Izugbara | Caroline W. Kabiru | Sharon Fonn | Kathleen Kahn | Lenore Manderson | Ashiwel S. Undieh | Akinyinka Omigbodun | Margaret Thorogood
Transport Infrastructure Surveillance and Monitoring by Electromagnetic Sensing: The ISTIMES Project

Author(s): Monica Proto | Massimo Bavusi | Romeo Bernini | Lorenzo Bigagli | Marie Bost | Frédrèric. Bourquin | Louis-Marie Cottineau | Vincenzo Cuomo | Pietro Della Vecchia | Mauro Dolce | Jean Dumoulin | Lev Eppelbaum | Gianfranco Fornaro | Mats Gustafsson | Johannes Hugenschimdt | Peter Kaspersen | Hyunwook Kim | Vincenzo Lapenna | Mario Leggio | Antonio Loperte | Paolo Mazzetti | Claudio Moroni | Stefano Nativi | Sven Nordebo | Fabrizio Pacini | Angelo Palombo | Simone Pascucci | Angela Perrone | Stefano Pignatti | Felice Carlo Ponzo | Enzo Rizzo | Francesco Soldovieri | Fédrèric Taillade
Presenting a Model for Ranking Organizations Based on the Level of the Information Security Maturity

Author(s): Abbas Toloie Eshlaghy | Alireza Pourebrahimi | Babak Zendehdel Nobari
Database Replication: A Survey of Open Source and Commercial Tools

Author(s): Salman Abdul Moiz | Sailaja P. | Venkataswamy G. | Supriya N. Pal
A MAC Protocols using Networks

Author(s): V. Ganesh Babu | Dr. T. Senthil Kumar
Scenario-based earthquake hazard and risk assessment for Baku (Azerbaijan)

Author(s): G. Babayev | A. Ismail-Zadeh | J.-L. Le Mouël
SEVERITY BASED CODE OPTIMIZATION : A DATA MINING APPROACH

Author(s): M.V.P. Chandra Sekhara Rao | Dr.B.Raveendra Babu, | Dr. A.Damodaram, | Mrs.Aparna Chaparala
Can incubators work in Africa? Acorn Technologies and the entrepreneur-centric model

Author(s): Chakma Justin | Masum Hassan | Singer Peter
Interprofessional collaboration: three best practice models of interprofessional education

Author(s): Diane R. Bridges | Richard A. Davidson | Peggy Soule Odegard | Ian V. Maki | John Tomkowiak
A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Author(s): Shiva Prakash, | Rajeev Kumar, | Brijesh Nayak, | Manindar Kumar Yadav
E-Government Readiness Assessment for Government Organizations in Developing Countries

Author(s): Ibrahim A. Alghamdi | Robert Goodwin | Giselle Rampersad
Mapping of health system functions to strengthen priority programs. The case of maternal health in Mexico

Author(s): González-Block Miguel | Rouvier Mariel | Becerril Victor | Sesia Paola
The impact on nurses and nurse managers of introducing PEPFAR clinical services in urban government clinics in Uganda

Author(s): Nankumbi Joyce | Groves Sara | Leontsini Elli | Kyegombe Nambusi | Coutinho Alex | Manabe Yuka
STUDY OF ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

Author(s): B.SOUJANYA, | T.SITAMAHALAKSHMI, | CH.DIVAKAR
A Wide Scale Survey on Botnet

Author(s): Amit Kumar Tyagi | G.Aghila
Analysis of the Interaction between Routing Protocols and MANET Parameters

Author(s): Md. Nazmul Islam Khan | Rashed Ahmed | Md. Tariq Aziz
UPDATE ON ENVIRONMENTAL RESEARCH INFRASTRUCTURE AT “ALEXANDRU IOAN CUZA” UNIVERSITY OF IASI: THE “CERNESIM” PROJECT

Author(s): NAELA COSTICĂ | R. I. OLARIU | M. COSTICĂ | IULIANA GABRIELA BREABAN | IOANA ALEXANDRA RUSU | CECILIA ARSENE | I. M. CIUMASU
Effect of Quality Parameters in Efficient Routing Protocol –Grid FSR with Best QoS Constraints

Author(s): S. Nithya Rekha | Dr. C. Chandrasekar | R. Kaniezhil
Towards a Sustainable Spatial Organization of the Energy System: Backcasting Experiences from Austria

Author(s): Petra Wächter | Michael Ornetzeder | Harald Rohracher | Anna Schreuer | Markus Knoflacher
A Study on Cloud Security Issues and Challenges

Author(s): A. Mercy Gnana Rani1 | Dr.A.Marimuthu2
Application Based Detection Technique for Secure Mobile Ad-hoc Network

Author(s): Kamini Maheshwar | Sapna Bagde | Deshraj Ahirwar
Energy Efficient Management for mobile AD Hod Networks AD HOC NETWORKS

Author(s): Abhishek Agrawal | Rajendra Lambodari
Botnet-A Network Threat

Author(s): Sonal P.Patil | Swatantra Kumar
Framework for Query Optimization

Author(s): Pawan Meena | Arun Jhapate | Parmalik Kumar
A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

Author(s): Askoxylakis IoannisG | Tryfonas Theo | May John | Siris Vasilios | Traganitis Apostolos
SPM: Source Privacy for Mobile Ad Hoc Networks

Author(s): Ren Jian | Li Yun | Li Tongtong
Evaluation and Design Space Exploration of a Time-Division Multiplexed NoC on FPGA for Image Analysis Applications

Author(s): Zhang Linlin | Fresse Virginie | Khalid Mohammed | Houzet Dominique | Legrand Anne-Claire
Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad-hoc Mobile Networks

Author(s): K Ranganath | L.Naveen Kumar | Y.V.Sreevani
Damages caused by floods and flash-floods upon critical infrastructures. Case study: Maramureş county (Romania)

Author(s): Eugen Nour | Andra C. Gagiu | Viorel I. Arghiuş | Camelia S. Botezan | Emil G. Roman | Alexandru Ozunu
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP

Author(s): Mohammad Ayoub Khan | Abdul Quaiyum Ansari
Security Architecture of Cloud Computing

Author(s): V.KRISHNA REDDY | Dr. L.S.S.REDDY
Guest Editorial

Author(s): WeiQi YAN | Sabu Emmanuel | Mohan S Kankanhalli
Guest Editorial

Author(s): Lei Shu | Hsiao-Hwa Chen | Takahiro Hara | Der-Jiunn Deng | Lei Wang
Guest Editorial

Author(s): Subir Das | Jing Deng | Mario Gerla | Nada Gomie | Jason H. Li | Jiang (Linda) Xie
Lo retro siempre está de moda

Author(s): Antonio Miranda
ïSCOPE: Safer care for older persons (in residential) environments: A study protocol

Author(s): Cranley Lisa | Norton Peter | Cummings Greta | Barnard Debbie | Estabrooks Carole
Woodland caribou calf recruitment in relation to calving/post-calving landscape composition

Author(s): Sara C. McCarthy | Robert B. Weladji | Christine Doucet | Paul Saunders
Collective Sensing: Integrating Geospatial Technologies to Understand Urban Systems—An Overview

Author(s): Thomas Blaschke | Geoffrey J. Hay | Qihao Weng | Bernd Resch
National policy development for cotrimoxazole prophylaxis in Malawi, Uganda and Zambia: the relationship between Context, Evidence and Links

Author(s): Hutchinson Eleanor | Parkhurst Justin | Phiri Sam | Gibb Di | Chishinga Nathaniel | Droti Benson | Hoskins Susan
Ubiquitous robust communications for emergency response using multi-operator heterogeneous networks

Author(s): Fragkiadakis Alexandros | Askoxylakis Ioannis | Tragos Elias | Verikoukis Christos
A Cache Invalidation scheme through Data Classification in IVANET

Author(s): Arun Kumar Dubey | Sanjeev Sharma
An Information System for Risk-Vulnerability Assessment to Flood

Author(s): Subhankar Karmakar | Slobodan P. Simonovic | Angela Peck | Jordan Black
Incident prediabetes/diabetes and blood pressure in urban and rural communities in the Democratic Republic of Congo

Author(s): Hightower JD | Hightower CM | Salazar Vázquez BY | Intaglietta M
Problem Analysis of Routing Protocols in MANET in Constrained Situation

Author(s): Manish Bhardwaj, | Sachi Pandey, | R.P Mahapatra
Collaborative Rural Healthcare Network: A Conceptual Model

Author(s): U. Raja | D.J. McManus | J.M. Hardin | B.C. Haynes
A Study on Vehicle Detection and Tracking Using Wireless Sensor Networks

Author(s): G. Padmavathi | D. Shanmugapriya | M. Kalaivani
A User Identity Management Protocol for Cloud Computing Paradigm

Author(s): Safiriyu Eludiora | Olatunde Abiona | Ayodeji Oluwatope | Adeniran Oluwaranti | Clement Onime | Lawrence Kehinde
LIFE CYCLE MANAGEMENT FOR AN INVESTMENT PROJECT IN CLUJ-SĂLAJ AREA, ROMANIA

Author(s): Vasile Iuliu CIOMOŞ | Dorin Marcel CIATARÂŞ | Ilie VLAICU
GRID INFORMATION SECURITY FUNCTIONAL REQUIREMENT

Author(s): Amy Poh Ai Ling | Mukaidono Masao
Post-Disaster Image Processing for Damage Analysis Using GENESI-DR, WPS and Grid Computing

Author(s): Conrad Bielski | Simone Gentilini | Marco Pappalardo
Secure Routing Scheme in MANETs using Secret Key Sharing

Author(s): A. Amuthan | B.Aravind Baradwaj
Evaluating the Readiness of Iranian Research Centers in Knowledge Management

Author(s): Nasrin D. Mamaghani | Reza Samizadeh | Fatemeh Saghafi
Why do you need a reservation system?      Affiliate Program