Browsing Issue 02 by Title

Sort by: Order: Results:

  • Ismail, Yasser (2014)
    This Motion Estimation (ME) has been widely used in most of the video standards. It is the most computationally intensive part of video compression. Speed up this process will open new real time applications. A novel Fast ...
  • Alshami, Mohammed; Arslan, Tughrul; Thompson, John (2014)
    A Femtocell (FMC) is a low power cellular home base station, which is low in cost and operating in licensed spectrum. Nowadays, because of the requirement for high data rate and large area coverage indoors, FMC provides ...
  • Khan, Salman A. (2014)
    Extremal optimization is an optimization technique that has been applied to a number of complex optimization problems. One such optimization problem is topology design of enterprise networks. The problem involves simultaneous ...
  • Jamnejad, Iman; Heidarzadegan, Ali; Parvin, Hamid; Alinejad-Rokny, Hamid (2014)
    Software error detection is about finding and prediction software logical error before deliver it to customers by some of automatic approaches. Some of logical errors are hidden in source code and cannot be found simply ...
  • Hsieh, Hui-Ching; Chen, Yen-Chiu; Lin, He-Chih (2014)
    With the popularity of online shopping, Online to Offline (O2O) commerce is a newly business model between company and customers. Online to Offline (O2O) commerce means customers can order some services or products online, ...
  • Kandil, Magy; Gadallah, Ahmed; Tawfik, Faten; Kandil, Nema (2014)
    Ozone is one of the most effective pollutants in lower atmosphere. Concentration of ozone in atmosphere reveals its impact on plants, human and on other organic materials. Many techniques had been used in past to calculate ...
  • Andel, Todd R.; Barron, John W.; McDonald, J. Todd; Humphries, Jeffrey W. (2014)
    The modular exponentiation operation used in popular public key encryption schemes, such as RSA, has been the focus of many side channel analysis (SCA) attacks in recent years. Current SCA attack countermeasures are static, ...

All Journals


Advanced Search

Browse

Administrator Account