Sciweavers

24095 search results - page 4777 / 4819
» Researchers and Development - Young Researches
Sort
View
IJAHUC
2010
145views more  IJAHUC 2010»
14 years 6 months ago
Towards a routing framework in ad hoc space networks
Abstract: The unique characteristics of space networks lead to different research approaches from those in terrestrial networks. In this paper, a routing framework called Space Gat...
Chao Chen, Zesheng Chen
IJNSEC
2010
163views more  IJNSEC 2010»
14 years 6 months ago
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...
IJRR
2010
88views more  IJRR 2010»
14 years 6 months ago
Extracting Object Contours with the Sweep of a Robotic Whisker Using Torque Information
Several recent studies have investigated the problem of object feature extraction with artificial whiskers. Many of these studies have used an approach in which the whisker is rot...
Joseph H. Solomon, Mitra J. Z. Hartmann
ITIIS
2010
129views more  ITIIS 2010»
14 years 6 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
JIPS
2010
389views more  JIPS 2010»
14 years 6 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
« Prev « First page 4777 / 4819 Last » Next »