Browsing Volume 03 by Title

Sort by: Order: Results:

  • El-ghobashy, Ahmed N.; Attiya, Gamal M.; Kelash, Hamdy M. (2014)
    Semantic Web is an approach to facilitate communication by making the web suitable for computers. To enhance current Web, a semantic layer should be added to the web pages to enable computers understand them. Recently, ...
  • Thanh, Tran; Vu, Tran Hoang; Cuong, Nguyen Van; Nam, Pham Ngoc (2014)
    Intellectual Property (IP) core remote update via the Internet is an advantage of FPGA-based devices. Whereby the system designer or user can change or renew a part of his equipment. However, the problem of communication ...
  • Souad, Bekkouche; Mohamed, Faraoun Kame (2014)
    This paper presents a secure and robust image watermarking scheme based on the reversible DWT-DCT-SVD transformations to increase both integrity authentication and confidentiality. The proposed approach uses two types of ...
  • Andel, Todd R.; Barron, John W.; McDonald, J. Todd; Humphries, Jeffrey W. (2014)
    The modular exponentiation operation used in popular public key encryption schemes, such as RSA, has been the focus of many side channel analysis (SCA) attacks in recent years. Current SCA attack countermeasures are static, ...
  • Ghadi, M. Jabbari; Gilani, S. Hakimi; Afrakhte, H.; Baghramian, A. (2014)
    Utilization ofwind power as one of renewable resources of energy has been growing quickly all over the world in the last decades. Wind power generation is significantly vacillating due to the wind speed alteration. Therefore, ...
  • Rodríguez, Demóstenes Zegarra; Rosa, Renata Lopes; Bressan, Graça (2014)
    Entertainment applications that work with images and videos processing use the Cluster computing to decrease their rendering time. A complexity level can be experimentally determined according to the time spent to render ...

All Journals


Advanced Search

Browse

Administrator Account