To search, Click below search items.
All Published Papers Search Service
Title
A Secure Image Steganography using LSB and Double XOR Operations
Author
Ali Ahmed and Abdelmotalib Ahmed
Vol. 20 No. 5 pp. 139-144
Keywords
Steganography, Cryptography, Least significant bit method, Hybrid security method, PSNR, MSE
Passively Inferring Wireless Network Signal Quality from Different Data Resources
Emad Felemban,
Vol. 20 No. 5 pp. 132-138
Signal Quality, Wireless Cellular Networks, Mobile App, Signal Strength, IoT Infrastructure.
Wireless Indoor localization using fingerprinting and Trilateration
Safae El Abkari, Abdelilah Jilbab and Jamal El Mhamdi,
Vol. 20 No. 5 pp. 124-131
Indoor positioning, Wireless, Wi-Fi, Fingerprinting, Trilateration, RSS.
Compilation Time-Based Analysis using Optimized Iterative Techniques
Ume Farwa, Khurshid Asghar, Mubbashar Saddique
Vol. 20 No. 5 pp. 120-123
Compilation time performance analysis iterative techniques program optimization.