Sciweavers

CORR
2010
Springer
53views Education» more  CORR 2010»
13 years 7 months ago
Phase-Only Planar Antenna Array Synthesis with Fuzzy Genetic Algorithms
This paper describes a new method for the synthesis of planar antenna arrays using fuzzy genetic algorithms (FGAs) by optimizing phase excitation coefficients to best meet a desir...
Boufeldja Kadri, Miloud Boussahla, Fethi Tarik Ben...
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 7 months ago
Existence and Global Logarithmic Stability of Impulsive Neural Networks with Time Delay
The stability and convergence of the neural networks are the fundamental characteristics in the Hopfield type networks. Since time delay is ubiquitous in most physical and biologi...
A. K. Ojha, Dushmanta Mallick, C. Mallick
CORR
2010
Springer
59views Education» more  CORR 2010»
13 years 7 months ago
Efficient Password-Typed Key Agreement Scheme
In this paper, we will study Lee, Kim and Yoo, a verifier password typed key agreement scheme and demonstrate that the scheme is not secure. Then, the authors will propose an enha...
Sattar J. Aboud
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 7 months ago
Node Disjoint Multipath Routing Considering Link and Node Stability protocol: A characteristic Evaluation
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or ene...
Shuchita Upadhayaya, Charu Gandhi
CORR
2010
Springer
111views Education» more  CORR 2010»
13 years 7 months ago
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for...
Abdullah Al Hasib, Abdullah Azfar, Md. Sarwar Mors...
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 7 months ago
Mining The Successful Binary Combinations: Methodology and A Simple Case Study
The importance of finding the characteristics leading to either a success or a failure is one of the driving forces of data mining. The various application areas of finding succes...
Yuval Cohen
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 7 months ago
Performance Investigation of Virtual Private Networks with Different Bandwidth Allocations
A Virtual Private Network (VPN) provides private network connections over a publicly accessible shared network. The effective allocation of bandwidth for VPNs assumes significance...
Mahalakshmi Chidambara Natarajan, Ramaswamy Muthia...
CORR
2010
Springer
219views Education» more  CORR 2010»
13 years 7 months ago
Finding Sequential Patterns from Large Sequence Data
Data mining is the task of discovering interesting patterns from large amounts of data. There are many data mining tasks, such as classification, clustering, association rule mini...
Mahdi Esmaeili, Fazekas Gabor
CORR
2010
Springer
128views Education» more  CORR 2010»
13 years 7 months ago
A Performance Study of GA and LSH in Multiprocessor Job Scheduling
Multiprocessor task scheduling is an important and computationally difficult problem. This paper proposes a comparison study of genetic algorithm and list scheduling algorithm. Bo...
S. R. Vijayalakshmi, G. Padmavathi
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 7 months ago
A Comparative Study of Removal Noise from Remote Sensing Image
This paper attempts to undertake the study of three types of noise such as Salt and Pepper (SPN), Random variation Impulse Noise (RVIN), Speckle (SPKN). Different noise densities ...
Salem Saleh Al-amri, Namdeo V. Kalyankar, Santosh ...