To search, Click below search items.
All Published Papers Search Service
Title
Analysis of Cloud Security Vulnerabilities and Countermeasures
Author
Hyun-Min Son, Nak-Keun Joo, Hyun-Taek Choi, Hyun-Cheol Lee
Vol. 19 No. 2 pp. 200-206
Keywords
Attack, Cloud Compyting, Security, Threats, Vulnerability.
Bartering Method for Improving Privacy of LBS
Abdullah M Basahel, Adnan Ahmed Abi Sen, Mohammad Yamin, Sarah Alqahtani
Vol. 19 No. 2 pp. 207-213
Privacy, Security, LBS, POI, Bartering
Image Compression using Windowing Firefly Algorithm by Renyi 2-d Histogram based on Multilevel Thresholding
V. Manohar, G. Laxminarayana, T. Satya Savithri
Vol. 19 No. 3 pp. 1-10
Windowing Firefly Algorithm, Image Compression, 2-D histogram, thresholding, Renyi entropy.
Peak to Average Power Ratio (PAPR) Reduction in OFDM for Optic Communications based on Conventional Selected Mapping
Ousama M Abdulwanes Awad, Muhammed Fatih Kili?aslan, Javad Rahebi
Vol. 19 No. 3 pp. 11-15
Orthogonal Frequency Division Multiplexing, Conventional Selected Mapping, Fast Fourier Transform.