To search, Click below search items.
All Published Papers Search Service
Title
Two-stage image denoising by Principal Component Analysis with Self Similarity pixel Strategy
Author
K. John Peter, K. Senthamarai Kannan, S. Arumugan, G.Nagarajan
Vol. 11 No. 5 pp. 296-300
Keywords
Demosaicking, Gradient, Mosaic Image, Local Similarities, Mosaic, CFA
A New EAP Authentication Method for IEEE 802.11 Wireless
Younes El Hajjaji El Idrissi, Noureddine Zahid, Mohamed Jedra
Vol. 11 No. 6 pp. 1-11
Wireless network, security protocol, Access control, EAP, HPSL
A Novel E-cash Payment Protocol Using Trapdoor Hash Function on Smart Mobile Devices
Jian-Sen Wang, Fuw-Yi Yang, Incheon Paik
Vol. 11 No. 6 pp. 12-19
Electronic commerce, E-cash, Trapdoor hash function, Smart mobile devices
Critical Infrastructure Cyber Threat ? A Case Study
Y Wangdi, D Veal, S P Maj
Vol. 11 No. 6 pp. 20-23
Critical infrastructure, cyber threats, network security