Skip to main content
    • by 
    •   5  
      Computer NetworksDDoSSYN-floodingPacket Analysis
The inherent dynamical in grid computing has made it extremely difficult to come up with near-optimal solutions to efficiently schedule tasks in grids. Task Scheduling plays crucial role in Grid computing. It is a challenge-able issue... more
    • by  and +1
    •   52  
      BioinformaticsGrid ComputingQuantum ComputingArtificial Intelligence
Traffic analysis consists of capturing network traffic in order to identify and respond to anomalies that could be indicative of security threats or other areas of concern. The communication, network, and technological infrastructures... more
    • by 
    •   10  
      Information TechnologyInformation SecurityNetwork AnalysisCybersecurity
"Networks are mathematically directed (in practical applications also undirected) graphs and a graph is a one-dimensional abstract complex, i.e., a topological space. Network theory focuses on various topological structures and... more
    • by  and +2
    •   182  
      BioinformaticsEvolutionary BiologyMathematicsOptimization (Mathematical Programming)
This paper was designed to provide Intranet traffic monitoring by sniffing the packets at the local Area Network (LAN) server end to provide security and control. It was implemented using five computer systems configured with static... more
    • by 
    •   12  
      Public AddressPacket schedulingMANET Routing protocolsInternet Routing Protocol
    • by 
    •   339  
      Discourse AnalysisHistoryModern HistoryCultural History
    • by 
    •   6  
      Information SecurityNetwork SecurityComputer NetworksIT security phishing and spoofing
g o w e r p u b . c o m g o w e r p u b . c o m g o w e r p u b . c o m g o w e r p u b . c o m g o w e r p u b . c o m g o w e r p u b . c o m g o w e r p u b . c o m g o w e r p u b . c o m © Copyrighted Material © Copyrighted Material
    • by 
    •   27  
      Quantum ComputingArtificial IntelligenceInformation Systems (Business Informatics)Machine Learning
    • by 
    •   11  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
Network monitoring signifies to the practice of managing the procedure of a computer network using specified management software tools. As network persist to grow,it isvery important that network administrators are responsive of the... more
    • by 
    •   2  
      Packet AnalysisWireshark
Migration from IPv4 to IPv6 is still visibly slow, mainly because of the inherent cost involved in the implementation, hardware and software acquisition. However, there are many values IPv6 can bring to the IP enabled environment as... more
    • by 
    •   17  
      Information TechnologyTechnologyWireless CommunicationsNetwork Security
In this paper, we propose a new block cipher called BC2 (Block Cipher 2). We make a cipher using components that are believed secure. The structure of BC2 is very simple. We use Feistel network with input-output 128 bits, matrix Maximum... more
    • by 
    •   13  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
Communication network plays an important role in providing safe vehicular movement. The main achievement of VANET is providing comfort and safety for passengers. In addition to that, various transactions like information on accident, road... more
    • by 
    •   12  
      Data CommunicationsIntelligent Transportation SystemsCommunication NetworksData Communication and Computer Networks
    • by 
    •   3  
      Network SecurityMonitoringPacket Analysis
The exponential rise in wireless communication systems and allied applications has revitalized academiaindustries to achieve more efficient data transmission system to meet Quality-of-Service (QoS) demands. Amongst major wireless... more
    • by 
    •   13  
      Evolutionary ComputationComputer NetworksRoutingMANET Routing protocols
IP filtering is a technique used to control IP packets flow in and out of a network where Filter engine inspects at source and destination IP of incoming and outgoing packets. Here Filter engine is designed to improve the performance of... more
    • by 
    •   7  
      Computer ScienceComputer NetworksIPv6Ip Lookup
This work has the goal to study how an efficient deep packet inspection (DPI) algorithm may be implemented using the graphical processing unit (GPU) CUDA (Computer Unified Device Architecture) enabled boards existing in personal... more
    • by 
    •   4  
      Compute Unified Device Architecture NVIDIA CUDADeep Packet InspectionCUDA Programming, GPU ComputingPacket Analysis
CHU Time Station Proposal for Western Canada, to compliment WWV, WWVH, WWVB time stations.
    • by 
    •   8  
      Real-time SystemsRadioError Correction CodingPhilosophy of Time
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and alternative cluster head node, problem... more
    • by 
    •   11  
      Wireless CommunicationsWireless Sensor NetworksEncapsulation Efficiency of Food Flavours and Oils duringMulti Hop Wireless Networks
Through this article, we try to offer alternative solutions to handle DDoS attacks. The discussion begins with a study of literature on DDoS attacks that include the mechanism of DDoS attack detection proposed by several researchers. The... more
    • by 
    •   3  
      ClassificationPacket AnalysisDDOS Attack
—Networks are getting greater and more compound, yet superintendents rely on elementary tools such as and to debug problems. Thus, an programmed and organised approach for testing and debugging networks called " Automatic Test Packet... more
    • by 
    • Packet Analysis
With the rapid development of multimedia and network technology, people can access a large number of multimedia information. For people who want to make full use of multimedia information resources, the primary question is how to query... more
    • by 
    •   11  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
"PURPOSE: To evaluate the accuracy of detecting cephalometric landmarks automatically by computer. MATERIALS AND METHODS: Digital image processing algorithms (edge-based and morphological) in addition to mathematical algorithms... more
    • by 
    •   147  
      Computer ScienceQuantum ComputingComputer GraphicsSoftware Engineering
Various factors can have a significant degrading impact on the residential Voice over Internet Protocol (VoIP) phone services' quality. Hybrid fibre-coaxial (HFC) networks typically carry three types of traffic that include voice, data,... more
    • by 
    •   14  
      Max/MSP/JitterDatabasesQoS and QoEVOIP security
This thesis addresses the problem of identifying and tracking digital information that is shared using peer-to-peer file transfer and Voice over IP (VoIP) protocols. The goal of the research is to develop a system for detecting and... more
    • by 
    •   26  
      Distributed ComputingInformation RetrievalForensic ScienceComputer Networks
    • by  and +1
    •   6  
      Psychotherapy and CounselingQualitative Research MethodsMixed Methods ResearchCluster Analysis
This paper develops a prototyping technique for information systems security policies. Starting from the algebraic specification of a security policy, we derive an executable specification that represents a prototype of the actual policy.... more
    • by 
    •   29  
      Quantum ComputingArtificial IntelligencePhilosophy of MindLogic
One of the metrics used to ensure an efficient management of network services is the packet delay. However, packet delay is highly variable due to queuing mechanism in many network devices, including the host systems. In this paper, the... more
    • by 
    •   11  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, a secure and computationally feasible Algorithm called Optimized Multiple Huffman Tables... more
    • by 
    •   16  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
Recently, many new cyber-attacks like Phishing, Spear Phishing, Cross-Site Scripting (XSS), Denial of Service (DoS), SQL injection including, Man-In-The-Middle (MITM) attack, etc are originated in the transmission of data over a network.... more
    • by 
    •   8  
      CybercrimesComputer NetworksWireless Sensor NetworksDeep Packet Inspection
The proliferation of multimedia encryption techniques allows securing various applications including tele-browsing and visio-conferencing. However, these techniques may also constitute useful tools for malicious users to transmit... more
    • by 
    •   79  
      Quantum ComputingArtificial IntelligencePolitical EconomyImage Processing
Keywords: Windows Xp, arabic, keyboard, cell, acronyms, wizard
ويندوز إيكسبي، ويندوز إكس بي بالعربية، لوحة المفاتيح مفتاح تعديل، ثبات المفاتيح،
خلية، معالج،أحرف، مركز التعليمات والدعم،
    • by 
    •   88  
      Discourse AnalysisComputer ScienceAlgorithmsOperating Systems
Through this article, we try to offer alternative solutions to handle DDoS attacks. The discussion begins with a study of literature on DDoS attacks that include the mechanism of DDoS attack detection proposed by several researchers. The... more
    • by 
    •   3  
      ClassificationPacket AnalysisDDOS Attack
This paper proposes a reliable system to overcome the weakness of current the HF radio communication system for oceanic aeronautical flight routes. This system uses only one aeronautical VHF channel with air-to-air radio relay system... more
    • by 
    •   11  
      CommunicationMobile Ad Hoc NetworksPower ElectronicsData Analysis
    • by 
    •   12  
      Quantum ComputingArtificial IntelligenceWireless CommunicationsNetwork Security
In this paper, we propose a new block cipher called BC2 (Block Cipher 2). We make a cipher using components that are believed secure. The structure of BC2 is very simple. We use Feistel network with input-output 128 bits, matrix Maximum... more
    • by 
    •   11  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
Various factors can have a significant degrading impact on the residential Voice over Internet Protocol (VoIP) phone services' quality. Hybrid fibre-coaxial (HFC) networks typically carry three types of traffic that include voice,... more
    • by 
    •   16  
      Distributed ComputingMax/MSP/JitterDatabasesQoS and QoE
In this research work we have proposed a machine to machine model of authentication. This model is applicable where multiple electronic devices are working continuously 24 hours for monitoring and periodically need to have authentication... more
    • by 
    •   12  
      Signal ProcessingPKI (Cryptography)Signal IntegrityInternet of Things
IP filtering is a technique used to control IP packets flow in and out of a network where Filter engine inspects at source and destination IP of incoming and outgoing packets. Here Filter engine is designed to improve the performance of... more
    • by 
    •   14  
      Performance StudiesData Structures and AlgorithmsHash Functions• IP packet based network, infrastructure and network security.
In this paper, we propose a new block cipher called BC2 (Block Cipher 2). We make a cipher using components that are believed secure. The structure of BC2 is very simple. We use Feistel network with input-output 128 bits, matrix Maximum... more
    • by 
    •   13  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
This paper was designed to provide Intranet traffic monitoring by sniffing the packets at the local Area Network (LAN) server end to provide security and control. It was implemented using five computer systems configured with static... more
    • by 
    •   15  
      Computer SciencePublic AddressPacket schedulingMANET Routing protocols
Handling massive data flows in the online intrusion detection systems is considered one of the major challenges in computer network security. This paper presents a novel method that overcomes this challenge using data mining and... more
    • by 
    •   20  
      Computer ScienceDistributed ComputingInformation SecurityMachine Learning
In the most intrusion detection systems (IDS), a system tries to learn characteristics of different type of attacks by analyzing packets that sent or received in network. These packets have a lot of features. But not all of them is... more
    • by 
    •   11  
      Computer NetworksData CompressionIntrusion DetectionCorrelation
In this research work we have proposed a machine to machine model of authentication. This model is applicable where multiple electronic devices are working continuously 24 hours for monitoring and periodically need to have authentication... more
    • by 
    •   13  
      Signal ProcessingPKI (Cryptography)Signal IntegrityInternet of Things
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, a secure and computationally feasible Algorithm called Optimized Multiple Huffman Tables... more
    • by 
    •   17  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
Your article is protected by copyright and all rights are held exclusively by Springer-Verlag London. This e-offprint is for personal use only and shall not be self-archived in electronic repositories. If you wish to self-archive your... more
    • by 
    •   11  
      Quantum ComputingArtificial IntelligenceNetwork SecurityWireless Sensor Networks
Wireless Sensor networks are a challenging task due to the lack of resources in the network as well as the frequent changes in network topology. Various routing protocols are designed basically to establish correct and efficient paths... more
    • by 
    •   16  
      Electronic EngineeringTelecommunications EngineeringElectronics & Telecommunication EngineeringWireless Sensor Networks
Wireless sensor networks are useful for streaming multimedia in infrastructure-free and hazardous environments. However, these networks are quite different from their wired counterpart and are composed of nodes with constrained bandwidth... more
    • by 
    •   14  
      MultimediaPacket schedulingRouting protocolsNetwork Protocols and Architectures
In this article, a method to enhance the throughput for Multiple Input Multiple Output (MIMO) systems by optimizing packet length is proposed. Two adaptation algorithms are proposed. In the first algorithm, we use the Average Signal to... more
    • by  and +1
    •   13  
      Packet schedulingInformation Theory and codingMIMO-OFDM systemsMIMO Systems
Communication links in a sensor network are unstable such that running conventional TCP protocol over a high loss rate sensor networks will suffer from severe performance degradation. To handle a packet loss, conventional TCP retransmits... more
    • by 
    •   11  
      Information TechnologyCommunicationWireless CommunicationsComputer Networks