To search, Click below search items.
All Published Papers Search Service
Title
Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks
Author
Reshma C R. and Arun kumar B. R
Vol. 21 No. 5 pp. 168-174
Keywords
malicious user, security, attacks, threats, cryptography
Experimental validation of a dynamic analysis and fuzzy logic controller of greenhouse air temperature
Imen Haj Hamad, Amine Chouchaine, and Hajer Bouzaouache
Vol. 21 No. 5 pp. 175-182
Greenhouse, fuzzy logic controller, temperature, MATLAB/Simulink environment, Experimental validation