|
Congestion Avoidance and Energy Efficient Routing Protocol for WSN Healthcare Applications |
|
|
1 | (10) |
|
|
|
|
An Efficient Method for Detecting Misbehaving Zone Manager in MANET |
|
|
11 | (11) |
|
Marjan Kuchaki Rafsanjani |
|
|
|
|
Query Answering Driven by Collaborating Agents |
|
|
22 | (9) |
|
|
Attribute-Based Access Control for Layered Grid Resources |
|
|
31 | (10) |
|
|
|
|
A Local Graph Clustering Algorithm for Discovering Subgoals in Reinforcement Learning |
|
|
41 | (10) |
|
|
|
|
Automatic Skill Acquisition in Reinforcement Learning Agents Using Connection Bridge Centrality |
|
|
51 | (12) |
|
|
|
|
Security Analysis of Liu-Li Digital Signature Scheme |
|
|
63 | (8) |
|
|
|
|
An Optimal Method for Detecting Internal and External Intrusion in MANET |
|
|
71 | (12) |
|
Marjan Kuchaki Rafsanjani |
|
|
|
|
SNMP-SI: A Network Management Tool Based on Slow Intelligence System Approach |
|
|
83 | (10) |
|
|
|
|
Intrusion Detection in Database Systems |
|
|
93 | (9) |
|
|
|
Marjan Kuchaki Rafsanjani |
|
|
A Secure Routing Using Reliable 1-Hop Broadcast in Mobile Ad Hoc Networks |
|
|
102 | (10) |
|
|
|
A Hybrid Routing Algorithm Based on Ant Colony and ZHLS Routing Protocol for MANET |
|
|
112 | (11) |
|
Marjan Kuchaki Rafsanjani |
|
|
|
|
Decision-Making Model Based on Capability Factors for Embedded Systems |
|
|
123 | (7) |
|
|
|
|
Socio-Psycho-Linguistic Determined Expert-Search System (SPLDESS) Development with Multimedia Illustration Elements |
|
|
130 | (8) |
|
|
A Packet Loss Concealment Algorithm Robust to Burst Packet Loss Using Multiple Codebooks and Comfort Noise for CELP-Type Speech Coders |
|
|
138 | (10) |
|
|
|
|
|
|
Duration Model-Based Post-Processing for the Performance Improvement of a Keyword Spotting System |
|
|
148 | (7) |
|
|
|
|
|
|
|
|
Complexity Reduction of WSOLA-Based Time-Scale Modification Using Signal Period Estimation |
|
|
155 | (7) |
|
|
|
|
|
|
|
A Real-Time Audio Upmixing Method from Stereo to 7.1-Channel Audio |
|
|
162 | (10) |
|
|
|
|
|
|
Statistical Model-Based Voice Activity Detection Using Spatial Cues and Log Energy for Dual-Channel Noisy Speech Recognition |
|
|
172 | (8) |
|
|
|
|
3D Sound Techniques for Sound Source Elevation in a Loudspeaker Listening Environment |
|
|
180 | (8) |
|
|
|
|
|
|
Integrated Framework for Information Security in Mobile Banking Service Based on Smart Phone |
|
|
188 | (10) |
|
|
|
A Design of the Transcoding Middleware for the Mobile Browsing Service |
|
|
198 | (7) |
|
|
|
|
|
|
A Study of Context-Awareness RBAC Model Using User Profile on Ubiquitous Computing |
|
|
205 | (9) |
|
|
|
|
|
|
Challenges and Security in Cloud Computing |
|
|
214 | (4) |
|
|
|
3D Viewer Platform of Cloud Clustering Management System: Google Map 3D |
|
|
218 | (5) |
|
|
|
Output Current-Voltage Characteristic of a Solar Concentrator |
|
|
223 | (4) |
|
|
|
|
Efficient Thread Labeling for Monitoring Programs with Nested Parallelism |
|
|
227 | (11) |
|
|
|
|
A Race Healing Framework in Simulated ARINC-653 |
|
|
238 | (9) |
|
|
|
|
|
|
A K-Means Shape Classification Algorithm Using Shock Graph-Based Edit Distance |
|
|
247 | (8) |
|
|
|
|
Efficient Caching Scheme for Better Context Inference in Intelligent Distributed Surveillance Environment |
|
|
255 | (7) |
|
|
A System Implementation for Cooperation between UHF RFID Reader and TCP/IP Device |
|
|
262 | (6) |
|
|
|
Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm |
|
|
268 | (8) |
|
|
|
|
|
|
Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring |
|
|
276 | (8) |
|
|
|
|
|
|
The Improved 4-PSK 4-State Space-Time Trellis Code with Two Transmit Antennas |
|
|
284 | (7) |
|
|
A Study on Efficient Mobile IPv6 Fast Handover Scheme Using Reverse Binding Mechanism |
|
|
291 | (10) |
|
|
|
|
|
|
A Software Framework for Optimizing Smart Resources in the Industrial Field |
|
|
301 | (10) |
|
|
|
Automatic Image Quality Control System |
|
|
311 | (5) |
|
|
|
|
|
Programmable RF System for RF System-on-Chip |
|
|
316 | (5) |
|
|
|
|
|
|
|
|
Development of a Mobile Language Learning Assistant System Based on Smartphone |
|
|
321 | (9) |
|
|
|
|
Implementation of the Sensor Node Hardware Platform for an Automatic Stall Management |
|
|
330 | (5) |
|
|
|
|
|
|
|
|
|
|
|
A Study on the Enhancement of Positioning Accuracy Performance Using Interrogator Selection Schemes over Indoor Wireless Channels |
|
|
335 | (8) |
|
|
|
A Fully Parallel, High-Speed BPC Hardware Architecture for the EBCOT in JPEG 2000 |
|
|
343 | (4) |
|
|
|
|
|
|
|
Implementating Grid Portal for Scientific Job Submission |
|
|
347 | (7) |
|
|
|
|
A Comprehensive Performance Comparison of On-Demand Routing Protocols in Mobile Ad-Hoc Networks |
|
|
354 | (16) |
|
|
|
Preserving Energy Using Link Protocol in Wireless Networks |
|
|
370 | (11) |
|
|
|
|
|
|
Trust Based Routing in Ad Hoc Network |
|
|
381 | (12) |
|
|
|
|
Routing in Ad Hoc Network Using Ant Colony Optimization |
|
|
393 | (12) |
|
|
|
|
Non-repudiation in Ad Hoc Networks |
|
|
405 | (11) |
|
|
|
|
|
The Vehicular Information Space Framework |
|
|
416 | (16) |
|
|
|
|
Effectiveness of AODV Protocol under Hidden Node Environment |
|
|
432 | (9) |
|
|
|
|
Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens |
|
|
441 | (9) |
|
|
|
|
|
Performance Evaluation of FAST TCP Traffic-Flows in Multihomed MANETs |
|
|
450 | (9) |
|
|
|
Fault Tolerant Implementation of Xilinx Vertex FPGA for Sensor Systems through On-Chip System Evolution |
|
|
459 | (10) |
|
|
|
|
Author Index |
|
469 | |