بحث بسيط
السجلات المعروضة 21 -- 30 من 34
MESP: A Modified IPSec for Secure Multicast Communication
(
IEEE
, 2006 , Article)
We propose the multicast encryption security protocol MESP. It is driven form the IPSEC ESP. The specification of the protocol are discussed and applied the existing IPSEC ESP. We use the existing implementation of the ...
A new approach of clustering based machine-learning algorithm
(
Elsevier B.V.
, 2005 , Article)
Machine-learning research is to study and apply the computer modeling of learning processes in their multiple manifestations, which facilitate the development of intelligent system. In this paper, we have introduced a ...
Failed Back Surgery Syndrome (FBSS) Prediction using Fuzzy Inference System (FIS)
(
IEEE
, 2007 , Article)
In this paper a fuzzy inference system (FIS) is presented to predict the level of risk for a class of patients to be needing a repeated surgery for the herniated lumber disc (or more commonly known as slipped disc). The ...
A semantic approach for document clustering
(
Academy Publisher
, 2009 , Article)
Conventional document mining systems mainly use the presence or absence of keywords to mine texts. However, simple word counting and frequency distributions of term appearances do not capture the meaning behind the words, ...
Guest Editorial: Special Issue on: WiMAX security and applications
(
John Wiley & Sons, Ltd.
, 2009 , Article)
Tutorials-Based System to Assist Qatari Children with Special Needs
(
IEEE
, 2008 , Article)
The objective of this project is to develop an Arabic predictive communication system for physically disabled people with speech and language impairments who are resident at the Shafalah Qatari center for children with ...
MASACAD: A multi-agent approach to information customization for the purpose of academic advising of students
(
Elsevier B.V.
, 2006 , Article)
The growth and advancement in the Internet and the World Wide Web has led to an explosion in the amount of available information. This staggering amount of information has made it extremely difficult for users to locate ...
Wireless Multicast Cross-Layer Framework for Rate
(
IEEE
, 2009 , Article)
Multicast-based data communication is an efficient communication scheme especially in multihop ad hoc networks where the MAC layer is based on one-hop broadcast from one source to multiple receivers. In this paper, we ...
A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study
(
IEEE
, 2009 , Article)
In mobile ad hoc networks (MANETs), many applications require group-oriented computing among a large number of nodes in an adversarial environment. To deploy these large-scale cooperative applications, secure multicast ...
Estimating design effort for the compressor design department: a case study at Pratt & Whitney Canada
(
Elsevier Ltd
, 2009 , Article)
The effort required in a design project not only impacts the final cost, but also the project lead-time. This paper presents a case study carried out with the collaboration of Pratt & Whitney Canada, a global leader in the ...