Hi there! Click one of our representatives below and we will get back to you as soon as possible.

DIP-Java

star_border star_border star_border star_border star_border

Fuzzy Random Impulse Noise Removal From Color Image Sequences

A new fuzzy filter is presented for the noise reduction of images corrupted with additive noise. The..

2,500.00INR
star_border star_border star_border star_border star_border

Game Based Analysis of Distributed DoS Attacks Prevention Using Puzzle-Based Defense Strategy

Availability of services in a Grid Computing system is a security concerned that has received enormo..

2,500.00INR
star_border star_border star_border star_border star_border

Geometry and Motion-Based Positioning Algorithms for Mobile Tracking in NLOS Environments

Positioning in wireless networks is today mainly used for yellow page services. Yet, its importance ..

2,500.00INR
star_border star_border star_border star_border star_border

GIVE 2 GET FORWARDING IN SOCIAL MOBILE WIRELESS N/W OF SELFISH NODES

In this paper, we present two forwarding protocols for mobile wireless networks of selfish individua..

2,500.00INR
star_border star_border star_border star_border star_border

Group Key Agreement with Local Connectivity

In this paper, we study a group key agreement problem where a user is only aware of his neighbors wh..

3,500.00INR
star_border star_border star_border star_border star_border

Growing Grapes in Your Computer to DefendAgainst Malware

 the aspect of malware, since some sophisticated malware that can bypass the signature detectio..

3,000.00INR
star_border star_border star_border star_border star_border

Guaranteed Packet Delivery Using Greedy Routing

Ad hoc network is an autonomous system that does not require a pre-established infrastructure. Nodes..

3,000.00INR
star_border star_border star_border star_border star_border

heap graph based software theft detection

As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to many co..

2,500.00INR
star_border star_border star_border star_border star_border

Heterogeneous web service selection from ontology repository using adaptive service selection algorithm

By these days, most companies are more aware of than ever in providing quality of services over the ..

2,500.00INR
star_border star_border star_border star_border star_border

Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing

Semantic Web is an emerging area to augment human reasoning. Various technologies are being develope..

2,500.00INR
star_border star_border star_border star_border star_border

HFSP Bringing Size-Based Scheduling To Hadoop

Size-based scheduling with aging has been recognized as an effective approach to guarantee fairness ..

3,500.00INR
star_border star_border star_border star_border star_border

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection

Abstract—We propose a highly scalable cluster-based hierarchical trust management protocol for wirel..

2,500.00INR
star_border star_border star_border star_border star_border

High Performance and High Scalable Packet Classification Algorithm for Network Security Systems

Packet classification is a core function in network and security systems; hence, hardware-based solu..

3,500.00INR
star_border star_border star_border star_border star_border

High throughput and memory efficient mutlimatch packet classification

XML is commonly supported by SQL database systems. However, existing mappings of XML to tables can o..

3,000.00INR
star_border star_border star_border star_border star_border

HireSome-II Towards Privacy-Aware CrossCloud Service Composition for Big Data Applications

Cloud computing promises a scalable infrastructure for processing big data applications such as medi..

3,000.00INR
Showing 106 to 120 of 252 (17 Pages)
LiveZilla Live Chat Software
Free Website Hit Counter
Free website hit counter