Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. There are many algorithms in for clustering. LEACH algorithm is one of the...
Davood KeyKhosravi, Ali Ghaffari, Ali Hosseinalipo...
This paper presents an improved adaptive algorithm for enhanced data hiding under HH-subband Haar Wavelet coefficients of a gray scale host image. The algorithm uses an optimal se...
Stuti Bazaj, Sachin Modi, Anand Mohan, S. P. Singh
Ever since, internet banking came into existence it has been a bull's eye for the hackers. Up to date, several cases have been reported by internet banking users for missing ...
Muththolib Sidheeq, Ali Dehghantanha, Geetha Kanan...
The theory of regions has been recognized as the optimal deadlock prevention policy based on the marking/transition-separation instance (MTSI) or the event-state-separation-proble...
The MTS-88.c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembl...