Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "information networks"

ADD TO MY LIST
 
USING GOOGLE+ FOR INSTRUCTION

Author(s): Kevin YEE | Jace HARGIS
SECURITY ISSUES IN COMPUTER NETWORK ARCHITECTURE

Author(s): Dr. M. Lilly Florence
How to Finding a Path to Zoning a Traffic Network Efficiently?

Author(s): Bing Su | Lin Fang | Qian Yang
The project HICARE: cross-sectoral action alliance against multi-resistant pathogens

Author(s): Linder, Roland | Thoms, Isabell | Pfenning, Ingo | Schadowski, Rolando | Möws, Volker
AUTOMOBILE NEUROBIONICS ON THE BASIS OF SIMULATED EVOLUTION METHODS

Author(s): O. Nikonov | O. Podolyaka | V. Ulko
Inovação na Indústria Brasileira: uma Análise Exploratória a Partir da PINTEC

Author(s): Sérgio Kannebley Junior | Geciane Silveira Porto | Elaine Toldo Pazello
Security Enhancement in Dynamic Telecast Routing

Author(s): Dr. GVN Prasad | M.Senthilkumar
MAKING SENSE OF AUTONOMY IN INFORMATION ONLINE JOURNALISM IN CHIAPAS

Author(s): Luis Fernando Bolaños Gordillo | Gilberto Antonio Ruiz Cáceres
Impact of Information Technology on Management Control at Al Bashir Public Hospital: A Case Study of Jordan

Author(s): Hasan Salih Suliman Al-Qudah | Abdalelah Saif Aldeen Saaty | Ameen Ahmad Mahboub Al-Momani
Conceptual Knowledge Approach to Operational Risk Management (A Case Study)

Author(s): Ali Hadi Jebrin | Abdalla Jamil Abu-Salma
Interpreting the neural networkfor prediction of fermentation of thick juice from sugar beet processing

Author(s): Jokić Aleksandar I. | Grahovac Jovana A. | Dodić Jelena M. | Zavargo Zoltan Z. | Dodić Siniša N. | Popov Stevan D. | Vučurović Damjan G.
Urban health, environment, and inequalities Salud urbana, ambiente y desigualdades Saúde urbana, ambiente e desigualdades

Author(s): Maria Inês Reinert Azambuja | Aloyzio Cechella Achutti | Roberta Alvarenga Reis | Jacqueline Oliveira Silva | Paul Douglas Fisher | Roger dos Santos Rosa | Ronaldo Bordin | Francisco Arsego de Oliveira | Roger Keller Celeste | Aline Petter Schneider | Darci Barnech Campani | Lívia Piccinini | Maurem Ramos | Miguel Aloysio Sattler | Paulo Antonio Barros Oliveira | Alzira Maria Baptista Lewgoy
Effect of Quality Parameters in Efficient Routing Protocol –Grid FSR with Best QoS Constraints

Author(s): S. Nithya Rekha | Dr. C. Chandrasekar | R. Kaniezhil
Wireless Sensor Network Safety Study

Author(s): M.Shankar | Dr.M.Sridar | Dr.M.Rajani
Wideband Wireless Access Systems Interference Robustness: Its Effect on Quality of Video Streaming

Author(s): Aderemi A. Atayero | Oleg I. Sheluhin | Yuri A. Ivanov | Julet O. Iruemi
Forest Fire Prevention using Wireless Sensor Networks

Author(s): PRASHANTH | Prof K.Ashok Babu
A P2P Approach for Efficient Certificate Revocation in MANET

Author(s): Suresh Babu Tumula | K.R.R.Mohana Rao
Protection through Oblivion 'An Image Based Steganography'

Author(s): T Chandra Sekhara Reddy | D Prasad | B.Venkateswara Reddy
Application Based Detection Technique for Secure Mobile Ad-hoc Network

Author(s): Kamini Maheshwar | Sapna Bagde | Deshraj Ahirwar
Sampling of Random Data Streams

Author(s): Gustav Cepciansky | Ladislav Schwartz
CATV Network Evolution

Author(s): Jan Hlubik | Ladislav Schwartz | Vladimir Hottmar
Information Approach to Safety Analysis of Signalling Systems

Author(s): Nadezda Hanusova | Jiri Zahradnik
Methods of Calculation of Digital Signals Spectra

Author(s): Gustav Cepciansky | Ladislav Schwartz
POWER – AWARE ROUTING IN MANET USING RANDOMIZED CASTING

Author(s): B.Siva kumar | K.Tharani | S.venkatasen
A Web Service-Based Framework Model for People-Centric Sensing Applications Applied to Social Networking

Author(s): David Nunes | Thanh-Dien Tran | Duarte Raposo | André Pinto | André Gomes | Jorge Sá Silva
Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

Author(s): Andrea Caiti | Vincenzo Calabrò | Gianluca Dini | Angelica Lo Duca | Andrea Munafò
Quantitative Comparison of Conformational Ensembles

Author(s): Kevin C. Wolfe | Gregory S. Chirikjian
Review Of Syn-Flooding Attack Detection Mechanism

Author(s): Mehdi Ebady Manna | Angela Amphawan
Performance Evaluation of Wi-Fi comparison with WiMAX Networks

Author(s): M.Sreerama Murty | D.Veeraiah | A.Srinivas Rao
Information Fusion-Based Storage and Retrieve Algorithms for WSNs in Disaster Scenarios

Author(s): Zhe Xiao | Ming Huang | Jihong Shi | Wenwei Niu | Jingjing Yang
PRINCIPLE OF VIRTUAL USE METHOD IN COMMON GATEWAY INTERFACE PROGRAM ON THE DACS SCHEME

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa
PRINCIPLE OF VIRTUAL USE METHOD IN COMMON GATEWAY INTERFACE PROGRAM ON THE DACS SCHEME

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa
Link Quality Based Traffic Queue Management at 5.8 GHz

Author(s): Anwar Hassan Ibrahim | Mahamod Ismail | Kasmiran Jumari | Mandeep Singh
Improving the Performance of Packet Transfer in Network Mobility

Author(s): M. Dinakaran | P. Balasubramanie
Study on an Improved Algorithm based on LEACH Protocol

Author(s): Chunyao Fu | Wei Wei | Ang Wei
Image Retrieval Based on Topological Features of Gray-level Co-occurrence Networks

Author(s): Zheng-Liang Huang | Shi-Ze Guo | Zhe-Ming Lu
Efficient Hand off using Fuzzy and Simulated Annealing

Author(s): Vikas.M.N | Keshava.K.N | Prabhas.R.K | Hameem Shanavas.I
Application of Erlang Formulae in Next Generation Networks

Author(s): Erik Chromy | Tibor Misuth | Adam Weber
3D Recognition Using Neural Networks

Author(s): Elhachloufi Mostafa | El Oirrak Ahmed | Aboutajdine Driss | Kaddioui Mohamed Najib
ON-LINE MARKETING-COMMUNICATION IN HUNGARY

Author(s): Krisztina TARALIK
Optimal Exploitation of the Sentinel-2 Spectral Capabilities for Crop Leaf Area Index Mapping

Author(s): Katja Richter | Tobias B. Hank | Francesco Vuolo | Wolfram Mauser | Guido D’Urso
Data Hiding in JPEG Images

Author(s): S. K. Muttoo | Sushil Kumar
A Mobile Transaction System for Open Networks

Author(s): R. B. Patel | Anu
Performance Analysis of High Speed Data Networks Using Priority Discipline

Author(s): K. Bhatia | A. K. Pal | Anu Chaudhary
Applications of the General Nonlinear Neural Networks in Solving the Inverse Optimal Value Problem with Linear Constraints

Author(s): Huaiqin Wu | Kewang Wang | Ning Li | Chongyang Wu | Qiangqiang Guo | Guohua Xu
Distributed Coding/Decoding Complexity in Video Sensor Networks

Author(s): Paulo J. Cordeiro | Pedro Assunção
Hash Security for Ad hoc Routing

Author(s): Ashwani Kush | C. Hwang
Simulation and Proportional Evaluation of AODV and DSR in Different Environment of WSN

Author(s): Pranav M. Pawar | Smita Shukla | Pranav Kulkarni | Adishri Pujari
Load Balancing in Integrated MANET, WLAN and Cellular Network

Author(s): Sulata Mitra | Arkadeep Goswami
The Cabauw Intercomparison campaign for Nitrogen Dioxide measuring Instruments (CINDI): design, execution, and early results

Author(s): A. J. M. Piters | K. F. Boersma | M. Kroon | J. C. Hains | M. Van Roozendael | F. Wittrock | N. Abuhassan | C. Adams | M. Akrami | M. A. F. Allaart | A. Apituley | S. Beirle | J. B. Bergwerff | A. J. C. Berkhout | D. Brunner | A. Cede | J. Chong | K. Clémer | C. Fayt | U. Frieß | L. F. L. Gast | M. Gil-Ojeda | F. Goutail | R. Graves | A. Griesfeller | K. Großmann | G. Hemerijckx | F. Hendrick | B. Henzing | J. Herman | C. Hermans | M. Hoexum | G. R. van der Hoff | H. Irie | P. V. Johnston | Y. Kanaya | Y. J. Kim | H. Klein Baltink | K. Kreher | G. de Leeuw | R. Leigh | A. Merlaud | M. M. Moerman | P. S. Monks | G. H. Mount | M. Navarro-Comas | H. Oetjen | A. Pazmino | M. Perez-Camacho | E. Peters | A. du Piesanie | G. Pinardi | O. Puentedura | A. Richter | H. K. Roscoe | A. Schönhardt | B. Schwarzenbach | R. Shaiganfar | W. Sluis | E. Spinei | A. P. Stolk | K. Strong | D. P. J. Swart | H. Takashima | T. Vlemmix | M. Vrekoussis | T. Wagner | C. Whyte | K. M. Wilson | M. Yela | S. Yilmaz | P. Zieger | Y. Zhou
Relevant Networks involving the p53 Signalling Pathway in Renal Cell Carcinoma

Author(s): V. Medina Villaamil | G. Aparicio Gallego | I. Santamarina Caínzos | L. Valbuena Ruvira | M. Valladares-Ayerbes | L. M. Antón Aparicio
A Proposal of Sensor Data Collection System Using Mobile Relay Nodes

Author(s): Kenya Sato | Hideki Shimada | Ryota Ayaki
Developing a Novel Method for Road Hazardous Segment Identification Based on Fuzzy Reasoning and GIS

Author(s): Farhad Samadzadegan | J. A. Rod Blais | Meysam Effati | Mohammad Ali Rajabi
A New Energy Efficient Data Gathering Approach in Wireless Sensor Networks

Author(s): Bahman Soltaninasab | Masoud Sabaei | Jafar Amiri
Developing Fault-Tolerant Heuristic Routing Algorithm Using Ant Colonies in Mesh Networks

Author(s): Alireza Shams Shafigh | Hekmat Mohammadzadeh | Alireza Soleimany | Shahriyar Lotfi
A New Energy Efficient Data Gathering Approach in Wireless Sensor Networks

Author(s): Bahman Soltaninasab | Masoud Sabaei | Jafar Amiri
Developing Fault-Tolerant Heuristic Routing Algorithm Using Ant Colonies in Mesh Networks

Author(s): Alireza Shams Shafigh | Hekmat Mohammadzadeh | Alireza Soleimany | Shahriyar Lotfi
Experimental Analysis of Xie and Kuek's Traffic Model with Handoff Scheme in Wireless Networks

Author(s): BISWAJIT BHOWMIK | POOJA | NUPUR THAKUR | PIYALI SARKAR
Application of Data Mining Techniques in Weather Prediction and Climate Change Studies

Author(s): Folorunsho Olaiya | Adesesan Barnabas Adeyemo
Relocatable, Automated Cost-Benefit Analysis for Marine Sensor Network Design

Author(s): Claire D’Este | Paulo de Souza | Chris Sharman | Simon Allen
Analisis y evaluación del routing information protocol RIP

Author(s): Octavio J. Salcedo Parra | Cesar Hernández | Hector C. Manta C.
Energy Saving in Wireless Sensor Networks

Author(s): Zahra Rezaei | Shima Mobininejad
Accurate location estimation of moving object In Wireless Sensor network

Author(s): Vijay Bhaskar Semwal | Vinay Bhaskar Semwal | Meenakshi Sati | Shirshu Verma
Digital Signatura Schemes for Secure Video

Author(s): R. N. Mandavgane | N.G.Bawane
New generatition of Networking with OSPF

Author(s): Pratik N. Katolkar | Sneha R. Burnase
Review of Cloud Computing Architecture for Social Computing

Author(s): Vaishali D. Dhale | A. R. Mahajan
Reliability Analysis of Multi Path Multistage Interconnection Networks

Author(s): Sudarson Jena | G.Sri Sowmya | P.Radhika | P.Venkat Reddy
New Strategy for detecting Intrusion by using c4.5 algorithm

Author(s): Radhakrishna Naik | Vivek Kshirsagar | B S Sonawane
Quality of Service Using PSO Algorithm

Author(s): S.M. ELseuofi
Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Author(s): Prasad Patil | Rinku Shah | Kajal Jewani
Modeling of SMF Link for Optical Networks

Author(s): B U Rindhe | S K Narayankhedkar | Sanjay Dudul
Nodes Credit based Direct Diffusion for wireless sensor networks

Author(s): Archana Patel | Surendra Verma | Roshani Patel
An Integrated Framework for Malware Collection and Analysis for Botnet Tracking

Author(s): Rakesh Kumar Sehgal | D. S. Bhilare | Saurabh Chamotra
Social Impact of Internet Access: A Survey

Author(s): Poonam Dhaka | Sandeep Upadhyay | Drashti Dave
Realization & Implementation of Wireless Parking System with GSM Based Security

Author(s): Meenakshi Tripathi | M. S. Gaur | Vijay Laxmi
Fuzzy C-Mean Clustering Algorithm Modification and Adaptation for Applications

Author(s): Bassam M. El-Zaghmouri | Marwan A. Abu-Zanona
Save time & money - Smart Internet Solutions      Why do you need a reservation system?