Sciweavers

43 search results - page 5 / 9
» ijactaicit 2010
Sort
View
IJACTAICIT
2010
135views more  IJACTAICIT 2010»
14 years 4 months ago
New Clustering Protocol to Decrease Probability Failure Nodes and Increasing the Lifetime in WSNs
Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. There are many algorithms in for clustering. LEACH algorithm is one of the...
Davood KeyKhosravi, Ali Ghaffari, Ali Hosseinalipo...
IJACTAICIT
2010
189views more  IJACTAICIT 2010»
14 years 7 months ago
An Improved Algorithm for Data Hiding Using HH-subband Haar Wavelet Coefficients
This paper presents an improved adaptive algorithm for enhanced data hiding under HH-subband Haar Wavelet coefficients of a gray scale host image. The algorithm uses an optimal se...
Stuti Bazaj, Sachin Modi, Anand Mohan, S. P. Singh
IJACTAICIT
2010
99views more  IJACTAICIT 2010»
14 years 4 months ago
Utilizing Trusted Platform Module to Mitigate Botnet Attacks
Ever since, internet banking came into existence it has been a bull's eye for the hackers. Up to date, several cases have been reported by internet banking users for missing ...
Muththolib Sidheeq, Ali Dehghantanha, Geetha Kanan...
IJACTAICIT
2010
84views more  IJACTAICIT 2010»
14 years 4 months ago
An Improved Deadlock Prevention Strategy for FMSs Using Theory of Regions
The theory of regions has been recognized as the optimal deadlock prevention policy based on the marking/transition-separation instance (MTSI) or the event-state-separation-proble...
Yi-Sheng Huang, Yen-Liang Pan
IJACTAICIT
2010
549views more  IJACTAICIT 2010»
14 years 7 months ago
Adding PC Connectivity to the MTS-88 Microcomputer Teaching System
The MTS-88.c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembl...
Omar Walid Abdul-Wahab, Wameedh Nazar Flayyih