Sciweavers

JDCTA
2010
125views more  JDCTA 2010»
13 years 6 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
JDCTA
2010
266views more  JDCTA 2010»
13 years 6 months ago
Clustering Based Multi-Objective Rule Mining using Genetic Algorithm
Ali Hadian, Mahdi Nasiri, Behrouz Minaei-Bidgoli
JDCTA
2010
113views more  JDCTA 2010»
13 years 6 months ago
A Watermarking Algorithm Based on Block Energy Analysis of Wavelet Transform's Coefficients and Lorenz Chaotic Attractor
Perceptual transparency and robustness are conflicting requirements. To ensure the security of the watermarkhow to choose the embedding position and intensity is a difficult probl...
Xuelong Hu, Wei Tian, Yongai Zheng
JDCTA
2010
148views more  JDCTA 2010»
13 years 6 months ago
Web Services Supervision System Based on Jade
Web service technology is one of the trend technologies in computer science now, and recently with the rapid growth of web services deployed with the same functionality, many rese...
Ahmed Sallam, Zhiyong Li, Shaimaa Hassan
JDCTA
2010
131views more  JDCTA 2010»
13 years 6 months ago
GA Optimized Knowledge Base of FLC for Complex Industrial Process
Potti Subbaraj, Pon S. Godwin Anand
JDCTA
2010
175views more  JDCTA 2010»
13 years 6 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
JDCTA
2010
105views more  JDCTA 2010»
13 years 6 months ago
Investigating the relationship between consumers' style of thinking and online victimization in scamming
Unsolicited emails and online scams can erode both consumer confidence and consumer safety when interacting and transacting over the Internet. This paper uses content analysis to ...
Francesco Sofo, Michelle Berzins, Salvatore Ammira...
JDCTA
2010
150views more  JDCTA 2010»
13 years 6 months ago
Proof as Composition: An approach for the Large-granularity Web Services Composition
The large-granularity Web services are a new form of Web services. In contrast to the traditional Web services, they often have more interfaces, encapsulate more complex business ...
Yuyu Yin, Ying Li, Jianwei Yin, ShuiGuang Deng
JDCTA
2010
111views more  JDCTA 2010»
13 years 6 months ago
Internet as a "point of synergy" between communication and distribution: hypothesis of model applied to tourism
The wide diffusion of new technologies in communication and business has changed how consumer and product/store knowledge has to be managed and represented digitally. This issue h...
Pierpaolo Singer, Maria Antonella Ferri, Lucia Aie...