Search
Now showing items 1081-1090 of 1111
Digital government service machine DGSM
(
IEEE
, 2008 , Conference Paper)
The rapid improvement in latest technologies motivates individuals to progress in their societies. Fast and worthy can be significant titles for the demands of this modern life. And because of technology improvements, there ...
Efficient forward error correction for reliable transmission in packet networks
(
dblp computer science bibliography
, 2008 , Conference Paper)
This paper proposes an approach that utilizes a new forward error correction mechanism for reconstructing lost or corrupted packets sent over a Network. Instead of retransmissions of lost or corrupted packets, the new ...
Effect of octylphenol polyethylene oxide on the corrosion inhibition of steel in 0.5 M H2SO4
(
Elsevier
, 2004 , Article)
A non-ionic surfactant, octylphenol polyethylene oxide (OPPEO), was evaluated as an inhibitor for corrosion of low-carbon steel in 0.5M H 2SO4. Potentiodynamic and potentiostatic methods and scanning electron microscopy ...
Activation and stabilization of gallium arsenide anode in an aqueous photoelectrochemical cell
(
Elsevier
, 2003 , Article)
The formation of a porous layer on the surface of gallium arsenide anode, n-GaAs, increases photogenerated currents significantly. This layer was formed as a result of an anodic polarization of illuminated n-GaAs in acidified ...
The role of type II FB (I):Tl+ defect in laser light generation and color image formation at the low coordination surface sites of AgBr: Ab initio calculations
(
Elsevier
, 2006 , Article)
The role of type II FB (I):Tl+ color center at low coordination surface sites of AgBr thin films in providing tunable laser activity and photographic sensitization is examined. The double-well potential at this site is ...
Impact of MD5 authentication on routing traffic for the case of: EIGRP, RIPv2 and OSPF
(
Science Publications
, 2008 , Article)
Problem Statement: With the free flow of routing data and the high availability of computer resources, possible threats to the networks can result in loss of privacy and in malicious use of information or resources that ...
Performance evaluation of secured versus non-secured EIGRP routing protocol
(
dblp computer science bibliography
, 2008 , Conference Paper)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Business process reengineering in UAE public sector: A town planning case study
(
Emerald Group Publishing Limited
, 2007 , Article)
Purpose - To reengineer the applications' processes of the land department of Al-Ain Municipality and to develop an electronic version of the reengineered processes. Design/methodology/approach - The research approach used ...
Wireless application deploying cell broadcast, and bulk SMS/MMS
(
International Business Information Management Association, IBIMA
, 2009 , Conference Paper)
Cell broadcast is a mobile technology that allows messages to be broadcast to all mobile handsets and similar devices within a designated geographical area. The broadcast range can be varied, from a single cell to the ...
MB-C: Check-in mobile application using barcodes
(
International Business Information Management Association, IBIMA
, 2008 , Conference Paper)
This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates ...