Browsing Volume 03 by Title

Sort by: Order: Results:

  • Souad, Bekkouche; Mohamed, Faraoun Kame (2014)
    This paper presents a secure and robust image watermarking scheme based on the reversible DWT-DCT-SVD transformations to increase both integrity authentication and confidentiality. The proposed approach uses two types of ...
  • Andel, Todd R.; Barron, John W.; McDonald, J. Todd; Humphries, Jeffrey W. (2014)
    The modular exponentiation operation used in popular public key encryption schemes, such as RSA, has been the focus of many side channel analysis (SCA) attacks in recent years. Current SCA attack countermeasures are static, ...
  • Ghadi, M. Jabbari; Gilani, S. Hakimi; Afrakhte, H.; Baghramian, A. (2014)
    Utilization ofwind power as one of renewable resources of energy has been growing quickly all over the world in the last decades. Wind power generation is significantly vacillating due to the wind speed alteration. Therefore, ...
  • Rodríguez, Demóstenes Zegarra; Rosa, Renata Lopes; Bressan, Graça (2014)
    Entertainment applications that work with images and videos processing use the Cluster computing to decrease their rendering time. A complexity level can be experimentally determined according to the time spent to render ...

All Journals


Advanced Search

Browse

Administrator Account