To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10849

Title

Optimized Hybrid Security Model using Base 64 Algorithm in conjunction with Substitution Cipher to Enhance Text Security

Author

Abdullah Maitlo, Rafaqat Hussain Arain, Riaz Ahmed Shaikh, Hidayatullah Shaikh, Mahmood Hussain Shah, Safdar Ali Shah, Mumtaz Hussain Mahar

Citation

Vol. 18  No. 3  pp. 93-98

Keywords

Information Security, Network Security, Encryption, Decryption, Substitution Cypher, Cryptography


Title

A review of Requirement Elicitation techniques in OSSD

Author

Shehla Saeed, Umbreen Fatima and Faiza Iqbal

Citation

Vol. 18  No. 3  pp. 86-92

Keywords

Requirement engineering, requirement- elicitation, requirement acquisition, open source.


Title

New Full Reference Image Quality Assessment Method based on Edge Intensity

Author

Tarik Ahmad, Can Dogan VURDU, Javad Rahebi

Citation

Vol. 18  No. 3  pp. 82-85

Keywords

image quality assessment, wavelet transform, edge intensity.


Title

Components and means of communication within the Local Area Network: An analytical study

Author

Yaser Mohammed Mohammed Al Sawy

Citation

Vol. 18  No. 3  pp. 74-81

Keywords

LAN, communication equipment communication protocols LAN components LAN software


[1] ... [prev] [1481] [1482] [1483] [1484] [1485] [1486] [1487] [1488] [1489] [1490] [next] ... [2713]