Browsing Volume 07 by Title

Sort by: Order: Results:

  • Salih, Sami; Abdalrahman, AlAmeen; Elsharif, Kamal (2018-05-01)
    Both 6PE and 6VPE allow ISPs to provide end-to-end IPv6 connectivity over the legacy MPLS core networks. However, the security issues in IPv6 over Provider Edge Routers (6PE) lead to the development of IPv6 VPN Provider ...
  • Sagheer, Ali M.; Salih, Salih S.; Searan, Sura M. (2018-05-01)
    RC4 stream cipher is an encryption algorithm that is used in two domains of security realized for IEEE 802.11 LANs: one of them is wired equivalent confidentiality and the other is WI-FI Protected Access protocol. It is ...
  • Jujhavarapu, Srihitha; Babaeian, Mohsen; Mozumdar, Mohammad (2018-07-01)
    Driver drowsiness has been a significant hazard resulting in various traffic accidents, severe injuries, or even fatalities. Therefore, monitoring this condition is crucial not only in alerting drivers but also in avoiding ...
  • Sagheer, Ali M.; Searan, Sura M.; Salih, Salih S. (2018-07-01)
    RC4 stream cipher is one of the most significant symmetric cryptosystems, it is simple and used in many commercial products. RC4 uses dynamic permutations and avoids using Linear Feed Back Shift Register (LFSR). It has ...
  • Sholla, Sahil; Mir, Roohie Naaz; Chishti, Mohammad Ahsan (2018-05-01)
    A recent idea of providing better civic facilities to modern societies is the concept of the Internet of Things (IoT) enabled smart city. IoT seeks to connect all things to the global Internet. Though varied smart city ...
  • A. Jillepalli, Ananth; Conte de Leon, Daniel; T. Sheldon, Frederick; A. Haney, Michael (2018-09-01)
    Today, web browsers are a major avenue for cyber-compromise and data breaches. Web browser hardening, through high-granularity and tailored configurations, can help prevent or mitigate many of these attack avenues. For ...
  • Taban, Rawan Ali; Croock, Muayad Sadik (2018-11-01)
    Recently, eye tracking system occupies a wide area in the researching fields. Different applications were produced to tackle numerous problems in real-time systems. This paper proposes a directional control system based ...
  • Mahi-Rekik, Latifa Souad; Bourenane, Malika (2018-07-01)
    With the emergence of time-sensitive applications such as games and telephony, the introduction of the Quality of Service (QoS) in general and the improvement of transmission delays in particular have become a must in ...
  • Naseem, Shahid; Khan, Zeashan Hameed; Abid, Muhammad Irfan (2018-07-01)
    The aim of this paper is to present a comparative analysis between three models i.e. Lord’s model, Hampshire’s child trust model and cognitive agent model for protecting information before sharing it to others. For this ...
  • Nachet, Bakhta; Adla, Abdelkader (2018-03-01)
    Previous research in decision making has proposed the use of a case based reasoning approach to accumulate, organize, preserve, link and share diverse knowledge coming from past experiences. However, existing CBR systems ...
  • Bashir, Adil; Mir, Ajaz Hussain (2018-03-01)
    Internet of things (IoT) is gaining popularity now-a-days as it is revolutionizing the world of internet and physical systems in a more advanced and technical way. IoT consists of physical things in which sensing, processing ...
  • Bastaki, Eesa; Mahmoud, Magdi S.; El-Medany, Wael (2018-01-01)
    The special issue of the International Journal of Computing and Digital Systems (IJCDS), focuses on intelligent systems and performance evaluation, and publishes selected papers from the 9 th IEEEGCC 2017 conference May ...
  • Elsadig, Muawia A.; Fadlalla, Yahia A. (2018-01-01)
    Recently a great deal of attention has been paid to Mobile Ad Hoc Networks (MANETs) due to their important roles in many different applications that include, but are not limited to: civil, military, and health applications. ...
  • Mattar, Ebrahim; Al Mutib, Khalid; Al Sulaiman, Mansour; Ramdane, Hajar (2018-01-01)
    For efficient, and knowledge based navigation, it is essential to blend mobile robot navigation details with information and details from navigation paths-localities. In this respect, the presented scheme was focused towards ...
  • A. ELTatar, Mahmoud; M. Abu-Hudrouss, Ammar (2018-09-01)
    Ensuring the security of data while being transmitted or stored is a very important issue for companies and end users. Cryptography is used to transfer the data in a form that is not understood by anyone apart from the ...
  • Abdulkawi, Wazie M.; Sheta, Abdul Fattah A. (2018-01-01)
    The recent growth in identification, tracking, and sensing applications for the Internet of Things (IoT) has pushed the RFID technology to gain much attention due to its remarkable advantages compared to conventional ...
  • Richardson, Chase; Ghawwas, Ali; Ismail, Yasser; Henton, Raynaud; luo, Jiecai (2018-11-01)
    In today’s technology market, more and more devices are moving towards wireless charging. For example, one of the flagship companies, Apple, recently announced that they would begin to offer wireless charging in their ...
  • Alharbi, Mafawez (2018-03-01)
    The nurse-scheduling problem (NSP) is a critical issue in the healthcare sector. Hospitals must provide an effective, efficient, and high-quality service to their patients, where the aim of the hospital is to ensure that ...
  • Jihad, Noor J. (2018-03-01)
    The establishment of the optical fiber has transformed media transmission systems all over the world, empowering an extraordinary measure of data transmission, all at the speed of light. One of the most important achievements ...
  • Fadhil, Heba Mohammed (2018-11-01)
    A form for permitting services to user's everywhere is Cloud Computing; a suitable departure to the network is available upon request for a common set of constructive computing resources. These developments have created ...

All Journals


Advanced Search

Browse

Administrator Account