• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

The numerical Laplace transform: An accurate technique for analyzing electromagnetic transients on power system devices
Fulltext Access 8 Pages 2009
Exploiting selective instruction reuse and value prediction in a superscalar architecture
Fulltext Access 8 Pages 2009
Probabilistic evaluation of reserve requirements of generating systems with renewable power sources: The Portuguese and Spanish cases
Fulltext Access 8 Pages 2009
Automatic generation control of TCPS based hydrothermal system under open market scenario: A fuzzy logic approach
Fulltext Access 8 Pages 2009
Applying inherent capabilities of quantum-dot cellular automata to design: D flip-flop case study
Fulltext Access 8 Pages 2009
An implementation of the SANE Virtual Processor using POSIX threads
Fulltext Access 8 Pages 2009
An efficient signed digit montgomery multiplication for RSA
Fulltext Access 8 Pages 2009
Exploiting an abstract-machine-based framework in the design of a Java ILP processor
Fulltext Access 8 Pages 2009
Computation of TCSC reactance and suggesting criterion of its location for ATC improvement
Fulltext Access 8 Pages 2009
A wireless embedded tongue tactile biofeedback system for balance control
Fulltext Access 8 Pages 2009
Electricity transmission pricing: Tracing based point-of-connection tariff
Fulltext Access 8 Pages 2009
Power parameters calculations based on wavelet packet transform
Fulltext Access 8 Pages 2009
Adaptive load shedding and regional protection
Fulltext Access 8 Pages 2009
UPFC control parameter identification for effective power oscillation damping
Fulltext Access 8 Pages 2009
A two-stage planning and control model toward Economically Adapted Power Distribution Systems using analytical hierarchy processes and fuzzy optimization
Fulltext Access 8 Pages 2009
The relation of requirements uncertainty and stakeholder perception gaps to project management performance
Fulltext Access 8 Pages 2009
Refining component description by leveraging user query logs
Fulltext Access 8 Pages 2009
Analysis of security threats to MPLS virtual private networks
Fulltext Access 8 Pages 2009
A reversible information hiding scheme using left–right and up–down chinese character representation
Fulltext Access 8 Pages 2009
On finding minimum cost tree for multi-resource manycast in mesh networks
Fulltext Access 8 Pages 2009
Analysis of structural vulnerabilities in power transmission grids
Fulltext Access 8 Pages 2009
PON with Automatic Protection switching for high reliable communication
Fulltext Access 8 Pages 2009
Do countercyclical-weekend effects persist in online retail markets?
Fulltext Access 8 Pages 2009
Passive Optical Networks (PONs): Past, present, and future
Fulltext Access 8 Pages 2009
Indirect Branch Validation Unit
Fulltext Access 8 Pages 2009
A new method for digital encoder adaptive velocity/acceleration evaluation using a TDC with picosecond accuracy
Fulltext Access 8 Pages 2009
Sharing small optical buffers between real-time and TCP traffic
Fulltext Access 8 Pages 2009
Application of wavelets and Prony method for disturbance detection in fixed speed wind farms
Fulltext Access 8 Pages 2009
On feasibility boundaries of electrical power grids in steady state
Fulltext Access 8 Pages 2009
Design of a high performance architecture for real-time enhancement of video stream captured in extremely low lighting environment
Fulltext Access 8 Pages 2009
Probabilistic load flow with wind production uncertainty using cumulants and Cornish–Fisher expansion
Fulltext Access 8 Pages 2009
Fault location for underground distribution feeders: An extended impedance-based formulation with capacitive current compensation
Fulltext Access 8 Pages 2009
Engaging the net generation with evidence-based software engineering through a community-driven web database
Fulltext Access 8 Pages 2009
A grid operation model: Resource demand for an adequate incident management in high-, medium-, and low-voltage grids
Fulltext Access 8 Pages 2009
Multi-scale simulation of multi-machine power systems
Fulltext Access 8 Pages 2009
Topological network design: A survey
Fulltext Access 9 Pages 2009
The persistence of memory: Forensic identification and extraction of cryptographic keys
Fulltext Access 9 Pages 2009
Digital forensic implications of ZFS
Fulltext Access 9 Pages 2009
Using shellbag information to reconstruct user activities
Fulltext Access 9 Pages 2009
Forensic analysis of GPT disks and GUID partition tables
Fulltext Access 9 Pages 2009
DEX: Digital evidence provenance supporting reproducibility and comparison
Fulltext Access 9 Pages 2009
A second generation computer forensic analysis system
Fulltext Access 9 Pages 2009
Configurable symbol synchronizers for software-defined radio applications
Fulltext Access 9 Pages 2009
Detecting rogue access points using client-side bottleneck bandwidth analysis
Fulltext Access 9 Pages 2009
SDriver: Location-specific signatures prevent SQL injection attacks
Fulltext Access 9 Pages 2009
Digital Investigation as a distinct discipline: A pedagogic perspective
Fulltext Access 9 Pages 2009
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Fulltext Access 9 Pages 2009
On metadata context in Database Forensics
Fulltext Access 9 Pages 2009
Security architecture for virtual organizations of business web services
Fulltext Access 9 Pages 2009
Qualitative trust modeling in SOA
Fulltext Access 9 Pages 2009
Towards the homogeneous access and use of PKI solutions: Design and implementation of a WS-XKMS server
Fulltext Access 9 Pages 2009
Making sense of anti-malware comparative testing
Fulltext Access 9 Pages 2009
Multiapplication smart card: Towards an open smart card?
Fulltext Access 9 Pages 2009
Transport ticketing security and fraud controls
Fulltext Access 9 Pages 2009
Power-saving scheduling with a QoS guarantee in a mobile WiMAX system
Fulltext Access 9 Pages 2009
Integration of a speech activated control system and a wireless interworking unit for a CAN-based distributed application
Fulltext Access 9 Pages 2009
Study and performance of a group-based Content Delivery Network
Fulltext Access 9 Pages 2009
Deconstructing Network Attached Storage systems
Fulltext Access 9 Pages 2009
A new system architecture for crowd simulation
Fulltext Access 9 Pages 2009
Real-time control of power systems using nodal prices
Fulltext Access 9 Pages 2009
A new computational method for reactive power market clearing
Fulltext Access 9 Pages 2009
Particle swarm optimization with time varying acceleration coefficients for non-convex economic power dispatch
Fulltext Access 9 Pages 2009
Evaluation of the variations of short-circuit capacities along a feeder due to distribution system-type upgrading
Fulltext Access 9 Pages 2009
Parameters tuning of power system stabilizers using improved ant direction hybrid differential evolution
Fulltext Access 9 Pages 2009
Technical and economic impacts of active management on distribution network
Fulltext Access 9 Pages 2009
An analytical approach for assessment of voltage sags
Fulltext Access 9 Pages 2009
Hybrid evolutionary algorithms in a SVR-based electric load forecasting model
Fulltext Access 9 Pages 2009
Evolutionary algorithm solution and KKT based optimality verification to multi-area economic dispatch
Fulltext Access 9 Pages 2009
Prediction of hottest spot temperature in power transformer windings with non-directed and directed oil-forced cooling
Fulltext Access 9 Pages 2009
Transmission network expansion planning under deliberate outages
Fulltext Access 9 Pages 2009
Multilevel turbo coded–continuous phase frequency shift keying (MLTC–CPFSK)
Fulltext Access 9 Pages 2009
Influence of the Emissions Trading Scheme on generation scheduling
Fulltext Access 9 Pages 2009
Voltage security evaluation based on perturbation method
Fulltext Access 9 Pages 2009
Assessment of oscillatory stability constrained available transfer capability
Fulltext Access 9 Pages 2009
Price movements in the Japanese online home electronics market
Fulltext Access 9 Pages 2009
An artist life cycle model for digital media content: Strategies for the Light Web and the Dark Web
Fulltext Access 9 Pages 2009
E-service quality competition through personalization under consumer privacy concerns
Fulltext Access 9 Pages 2009
The 2007 procurement challenge: A competition to evaluate mixed procurement strategies
Fulltext Access 9 Pages 2009
Public–Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection
Fulltext Access 9 Pages 2009
Critical infrastructure dependency assessment using the input–output inoperability model
Fulltext Access 9 Pages 2009
Determining the mobile commerce user requirements using an analytic approach
Fulltext Access 9 Pages 2009
More efficient systolic arrays for multiplication in GF  (2m2m) using LSB first algorithm with irreducible polynomials and trinomials
Fulltext Access 9 Pages 2009
New left-to-right minimal weight signed-digit radix-r representation
Fulltext Access 9 Pages 2009
Fast edge integration based active contours for color images
Fulltext Access 9 Pages 2009
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Fulltext Access 9 Pages 2009
Soft sensor for NOxNOx and O2O2 using dynamic neural networks
Fulltext Access 9 Pages 2009
Process control interface system for a distillation plant
Fulltext Access 9 Pages 2009
Generating routing table for free roaming mobile agent in distributed environment
Fulltext Access 9 Pages 2009
Roaming across wireless local area networks using SIM-based authentication protocol
Fulltext Access 9 Pages 2009
Global Interoperability Using Semantics, Standards, Science and Technology (GIS3T)
Fulltext Access 9 Pages 2009
Forensic investigation of Microsoft PowerPoint files
Fulltext Access 9 Pages 2009
USIM-based EAP-TLS authentication protocol for wireless local area networks
Fulltext Access 9 Pages 2009
Guaranteeing hard real-time traffic with legitimately short deadlines with the timed token protocol
Fulltext Access 9 Pages 2009
Access delay in LonTalk MAC protocol
Fulltext Access 9 Pages 2009
Feedback scheduling of priority-driven control networks
Fulltext Access 9 Pages 2009
Simplified software inspection process in compliance with international standards
Fulltext Access 9 Pages 2009
The implementation guidance for practicing network isolation by referring to ISO-17799 standard
Fulltext Access 9 Pages 2009
Design and analysis of a highly secure stream cipher based on linear feedback shift register
Fulltext Access 9 Pages 2009
Provably secure proxy-protected signature schemes based on RSA
Fulltext Access 9 Pages 2009
Low complexity LMS-type adaptive algorithm with selective coefficient update for stereophonic acoustic echo cancellation
Fulltext Access 9 Pages 2009
<< < 299 300 301 302 303 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities