To search, Click below search items.
All Published Papers Search Service
Title
Public?Key Encryption using Decoder Algorithm
Author
V V S S S Balaram, K N Murty, B R Sastry
Vol. 8 No. 1 pp. 217-221
Keywords
Public-Key Encryption, Closest Vector Problem (CVP), ML Decoder.
Performance Comparison of Voice Packet Sizes in the FIFO Adversarial Queuing and FIFO M/M/1 Model
Abdullah Muhammed, KyairulNiza Mohd Saleh, Azizol Abdullah
Vol. 8 No. 1 pp. 222-227
voice, FIFO queuing model, delay, packet loss, adversarial, M/M/1, optimum packet size
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization
G. Sahoo, R. K. Tiwari
Vol. 8 No. 1 pp. 228-233
Container file, Supporting file, Stego-key, Multiple Container file, Hybridization.
Autonomous agent for gathering information to build focused index from distributed environment
Rushdi A. Hamamreh
Vol. 8 No. 1 pp. 234-237
Internet autonomous agent, distributed systems, Collections, latent semantic index, thematic filter.