A Novel Approach Of Image Steganography For Secret Communication Using Spacing Method Wa’el Ibrahim A. Almazaydeh1 H. S. Sheshadri2 and S. K. Padma1Research Scholar, PET Research Foundation, PESCE, Mandya, India 2PESCE, … Continue reading
Efficient PAPR Reduction Approach For Selective Mapping İn A STBC MIMO-OFDM System VijayaLakshmi M1 and K Rama Linga Reddy2 1ETM Dept, GNITS, Hyderabad, India2 HOD, ETM Dept, GNITS, Hyderabad, India Abstract … Continue reading
IJCNC 07
A Novel Approach Of Image Steganography For Secret Communication Using Spacing Method Wa’el Ibrahim A. Almazaydeh1 H. S. Sheshadri2 and S. K. Padma3 1Research Scholar, PET Research Foundation, PESCE, Mandya, … Continue reading
Symmetric Key Management Scheme for Hierarchical Wireless Sensor Networks Mohammed A. Al-taha1 and Ra’ad A. Muhajjar2 1Department of Computer Science, College of Science, Basrah University, Iraq 2Department of Computer Science, … Continue reading
IJCNC 02
Path Splitting For Virtual Network Embedding In Elastic Optical Networks Badr Oulad Nassar and Takuji Tachibana Graduate School of Engineering, University of Fukui, Fukui City, Japan Abstract In elastic optical … Continue reading
IJCNC 01
The Development And Study Of The Methods And Algorithms For The Classification Of Data Flows Of Cloud Applications In The Network Of The Virtual Data Center Irina Bolodurina1 and Denis … Continue reading
IJNSA 01
Unconstrained Endpoint Security System: Ueptss Fatema Bannat Wala1,2 and Chase Cotton1 1Department of Electrical & Computer Engineering, University of Delaware, Newark 2University of Delaware, Newark, USA Abstract Modern information security … Continue reading
ijcnc 5
Quad Tree Based Static Multi Hop Leach Energy Efficient Routing Protocol: A Novel Approach 1Abdulmalek Maresh Hasan Ali and 2Hanumanthappa .J. 1Research Scholar, Department of CS&E, VTU, Belgaum, Karnataka, India. … Continue reading
IJCNC 4
Response Surface Methodology For Performance Analysis And Modeling Of MANET Routing Protocols Mohamed Skander Daas1 and Salim Chikhi2 1MISC Lab, Department of Fundamental Computer Science and its Applications, Abdelhamid Mehri … Continue reading
IJNSA 2
Protecting Privacy in VANETs Using Mix Zones with Virtual Pseudonym Change “The author declares that there is no conflict of interest regarding the publication of this paper.” Belal Amro Hebron … Continue reading