Items 1 – 21 of 21 IRE is a collection of peer-reviewed International Journals published by Praise International Review on Computers and Software (IRECOS). Home > Products > Journal and Reviews > S. > Latest issue. International Review on. Computers and Software (IRECOS) December ( Vol. 8 N. 12). IRECOS, the International Review on Computers and Software, was indeed discontinued by Scopus in due to “publication concerns”.
Author: | Kazikree Shakarn |
Country: | Azerbaijan |
Language: | English (Spanish) |
Genre: | Politics |
Published (Last): | 11 November 2007 |
Pages: | 154 |
PDF File Size: | 7.11 Mb |
ePub File Size: | 4.20 Mb |
ISBN: | 406-3-87994-717-7 |
Downloads: | 63662 |
Price: | Free* [*Free Regsitration Required] |
Uploader: | Tygojora |
We strongly discourages courtesy authorship. The extraction of exudates fluid is done by mutual region growing and edge recognition methods. In addition our findings show the atmospheric noise tolerance of each processing technique.
We also showed its applications and advantages on video scene segmentation. Computer Science Computer Science miscellaneous. Watermarking of Medical Images with Optimized Biogeography. Abstract – Developing the P2P botnets detection framework is crucial when we trying to fight against P2P botnets. Evolution of the total number of citations and journal’s self-citations received by a journal’s published documents during the three previous years.
Finally the signcrypted data is compressed with the help of Huffman text coding procedure. The old network then performs the data transmission to the new network. The second challenge of effectiveness will be solved using new matching score to obtain better retrieval effectiveness. The lack of central control in wireless networks calls for the design of distributed scheduling algorithms.
Subscription Login to verify subscription Give a gift subscription. The security issue is a captious area in grid computing. GA and PSO have been applied for cryptanalysis of various protocols and encryption standards.
Style We accepts papers in Microsoft Word. This research work presents a novel technique to deal with the security problems.
Abstract – Frequent itemset mining from the database is a difficult task. Article Tools Print this article. To securely communicate very large messages, the cryptographic primitive called signcryption efficiently implements the same and while most of the public key based systems are suitable for small messages, hybrid encryption KEM-DEM provides a competent and practical way.
Rosy Salomi Victoria, S. The system consists of three stages. The submission’s principal contact will receive an acknowledgement by email and will be able to view the submission’s progress through the editorial process by logging in to the journal web site. Confirming the Submission To submit the manuscript to the journal you should click Finish Submission. Although not everything is needed to be disclosed, a paper must contain new, useable, and fully described information.
Furthermore, it has a high legal value for document authentication, as well as being dependent on by both commercial transactions and governmental institutions. Documents Year Value Uncited documents 0 Uncited documents 71 Uncited documents Uncited documents Uncited documents Uncited documents Uncited documents Uncited documents Uncited documents Cited documents 0 Cited documents 23 Cited documents 80 Cited documents Cited documents Cited documents Cited documents Cited documents Cited documents We demonstrate the power distribution result through mathematical analysis and perform numerous extensions for the measured difficulty.
First, we analyze and evaluate all the currently available clone detection techniques and tools. SimpleScalar simulator toolset is used to provide high flexible performance processor architecture. It specifies an API designed for enabling real-time data distribution and is well suited for such complex distributed systems and QoS-enabled applications. The SJR is a size-independent prestige indicator that ranks journals by their ‘average prestige per article’. Diabetic patients lost its vision if the exudates will extend to the macular area of the retina.
But it failed to locate the inner and the outer boundaries of the iris in the presence of dense eyelashes which results in poor pupil and iris localization. It optimizes the existing routing protocol by reducing the delay and increasing the lifetime of the network. The aforementioned problems can be avoided by using biometric template protection techniques for the online signature, which have been reviewed and discussed in this paper considering both protections and verification.
In order to solve the problem in digital watermarking, this research work proposes a biogeography algorithm with GA optimization to find the optimal allocation of location in images to embed information. Please see RTI’s privacy policy and cookie policy if you have questions about any information collected during the sign-up process.
The cloud client encrypts sessions with the standard method; however, the server does not fully protect such sessions. Furthermore deriving several results according to an adapted mathematical model of the Dead Sea.
Performance of the replica based approach is measured in terms of optic disk boundary detection, sensitivity and specificity.
Since the learning information is stored in textual format in most of the time, the retrieval lrecos learning objects from textual database faces two major challenges such as, large data handling, and effectiveness. The authors published in this journal are responsible for the human subject data that figures in the research reported here. The results obtained show that the ANFIS outperformed other denoising techniques in terms of localization of the components of the abnormal EEG signal.
The proposed processor is customized for the routing which is time-consuming phase. A method that has been recently developed uses local histogram and image statistics. This approach can be utilized with different embodiments, but the most effective realization would jiurnal to amplify some already given intrinsic approximate matching capabilities, like those in the FuzzyFind method [1][2].
Afterwards, the development of such knowledge base will be used to help professional actors to accomplish their task in bringing knowledge of past projects.
It is based on the idea that ‘all citations are not created equal’. A mobile device from anywhere in the wireless environment could utilize hournal a large computing power or any other resources in order to provide effective data and transaction process.
Uploading the Journwl To upload a manuscript to this journal, complete the following steps:
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.