An Enhanced Chaotic Image Encryption
Distributed Denial of Service (DDOS) Attacks Detection Mechanism
Model of solutions for data security in Cloud computing
A robust iris recognition method on adverse conditions
Optimization of latency of temporal key Integrity protocol (tkip) using graph theory And hardware software co-design
Survey of network anomaly detection using markov chain
ZERNIKE MOMENT-BASED FEATURE EXTRACTION FOR FACIAL RECOGNITION OF IDENTICAL TWINS
Energy efficient approach based on evolutionary algorithm for coverage control in heterogeneous wireless sensor
Survey on caching and replication algorithm for content distribution in peer to peer networks
FPGA ARCHITECTURE FOR FACIAL-FEATURES AND COMPONENTS EXTRACTION
Current services in cloud computing a survey
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
Candidate solutions to improve Wireless Mesh Networks WMNs performance to meet the needs of Smart Grid applications - Survey paper
Sentiment analysis by using fuzzy logic
Comparing reinforcement learning and access points with rowel
Detect sqli attacks in web apps using nvs
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEW
Configuration inerpsaas multi tenancy
Web service discovery methods and techniques a review
Technology Adoption In The Arabian Gulf Countries: The Case Of E-Government