Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
About
Editorial List
Publisher information
Focus and Scope
Open Access Policy
Publication Ethics
Author Guidelines
Peer Review Process
Current
Archives
Copyrights Form
Announcements
Contacts
Privacy Statement
Abstracting/ Indexing
Article processing charge
Search
Home
Archives
Vol. 13 No. 1 (2021)
Published:
2021-04-10
Research Articles
Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification
Manjula C Belavagi, Balachandra Muniyal
PDF
Design, optimization and Real Time implementation of a new Embedded Chien Search Block for Reed-Solomon (RS) and Bose-Chaudhuri-Hocquenghem (BCH) codes on FPGA Board
Azeddine WAHBI, Anas El Habti El Idrissi El Idrissi, Ahmed Roukhe, Bahloul Bensassi, Laamari Hlou
PDF
Method of Determining Trust and Protection of Personal Data in Social Networks
Oleksandr Laptiev, Vitalii Savchenko, Andrii Kotenko, Volodimir Akhramovych, Vladimir Samosyuk, German Shuklin, Anatjliy Biehun
PDF
A STABLE CLUSTERING SCHEME WITH NODE PREDICTION IN MANET
Drishya SR, Renukadevi S, Vaidehi V
PDF
Modeling, Development and Analysis Performance of an Intelligent Control of Photovoltaic System by Fuzzy Logic approach for Maximum Power Point Tracking
Ahmed Amine Barakate, Rida Abdelmoumene, Azeddine WAHBI, Mohamed Maddi, Laamari Hlou, Abdelkader Hadjoudja
PDF
Method of Detecting Radio Signals using Means of Covert by Obtaining Information on the basis of Random Signals Model
Oleksandr Laptiev, Vitalii Savchenko, Andrii Pravdyvyi, Ivan Ablazov, Rostyslav Lisnevsky, Oleksandr Koloss, Viktor Hudyma
PDF
Multi-Stage Protection Using Pixel Selection Technique for Enhancing Steganography
Khalil Ibrahim Mohammad Abuzanouneh, Mohammed Hadwan
PDF
SINK MOBILITY MODEL FOR WIRELESS SENSOR NETWORKS USING KOHONEN SELF-ORGANIZING MAP
Anas Abu Taleb
PDF
A Hybrid Graphical User Authentication Scheme in Mobile Cloud Computing Environments
Khalil H. A. Al-Shqeerat, Khalil Ibrahim Abuzanouneh
PDF
Improved Multi-Verse Optimizer Feature Selection Technique With Application To Phishing, Spam, and Denial Of Service Attacks
Malek Alzaqebah, Sana Jawarneh, Rami Mustafa Mohammad, Mutasem K Alsmadi, Ibrahim ALmarashdeh
PDF
Developing a simulated intelligent instrument to measure user behavior toward cybersecurity policies
Khalid Adnan Alissa, Bashar AlDeeb, Hanan A. Alshehri, Shahad A. Dahdouh, Basstaa M. Alsubaie, Afnan M. Alghamdi, Mutasem Alsmadi
PDF
FPGA Implementation of Data Flow Graphs for Digital Signal Processing Applications
Hala AL-Zu'bi, Osama Al-Khaleel, Ali Shatnawi
PDF
A Low Power Architectural Framework for Automated Surveillance System with Low Bit Rate Transmission
Hanan A. Hosni Mahmoud
PDF
Quasi Real-Time Intermodulation Interference Method: Analysis and Performance
Mohammad Malkawi, Khaldoon Al-Zoubi, Ahmed Shatnawi
PDF
Power Management Strategies in Energy-Harvesting Wireless Sensor Networks
Said El Abdellaoui, Youssef Fakhri
PDF
Enhancing Steganography by Image Segmentation and Multi-level Deep Hiding
Alaa' Al-Ahmad, Omar Saad Almousa, Qusai Abuein
PDF
Secure and Efficient Video Transmission in VANET
Nesrine Meddeb, Amel Meddeb Makhlouf, Mohamed Ali Ben Ayed
PDF
Surveys/ Reviews
WDM and DWDM based RoF system in Fiber Optic Communication Systems: A review
Duhaq Ehasn Mohsen, Ali Mehdi Hammadi, Ali J. Al-Askery
PDF