Search
Products meeting the search criteria
ANALYSING MULTIPATTERN MATCHING ON COMPRESSED HTTP TRAFFIC USING AHO-CORASICK ALGORITHM
In existing to detect malicious activities signature based algorithm is used but that technique was ..
Anomaly detection using forecasting methods ARIMA and HWDS
It is important to ensure network capacity utilization and improved delay and loss performance in so..
Area Efficient Parallel Fir Digital Filter Structure For Symmetric Convolution Based On Fast Fir Algorithm
The filter process mainly used to DSP and DIP real world application. The filter process to remove t..
Area-Delay-Power Efficient Carry-Select Adder
The digital architecture mainly used in all type of real world application architectures and thus th..
Authentication Using Captcha As Graphical Password
Security primitives are based on hard mathematical problems. Using hard AI problems for security is ..
Balancing the Trade-Offs between Query Delay and Data Availability in MANETs
Mobile Ad hoc Network (MANET) consists of mobile nodes which is connected without any centralized ad..
Big Data Analytics in Mobile Cellular Networks
Mobile cellular networks have become both the generators and carriers of massive data. Big data anal..
Bio-Inspired Glucose Control in Diabetes Based on an Analogue Implementation of a -Cell Model
This circuit is an electronic realization of the original -cell model equations which is achieved wi..
Bloom Cast Efficient and Effective Full Text Retrieval in unstructured Peer to Peer Networks
• The objective of the paper is to retrieve full-text in efficient and effective manner in unstructu..
Body Node Coordinator Placement Algorithms for Wireless Body Area Networks
The technology of sensor, pervasive computing, and intelligent information processing is widely us..
Botnet Detection based on Anomaly and Community Detection
A novel two-stage approach for the important cyber-security problem of detecting the presence of a..
Botnet Detection based on Anomaly and Community Detection-JAVA
A novel two-stage approach for the important cyber-security problem of detecting the presenc..
By Passing Infected Areas in Wireless Sensor Networks Using BPR
The hardware failure, software corruption and unfavorable operating environment among the diff..
Cartoon-Texture Image Decomposition Using Blockwise Low-Rank Texture Characterization
First, the input image is loaded and then the image is filtered. Gaussian filter is used for filteri..
CoCoWa A Collaborative Contact Based Watchdog for Detecting Selfish Nodes
Mobile Adhoc Network is a continuously self-configuring, infrastructure-less network of mobile devic..