| عنوان البحث | ملخص البحث |
| A Performance Comparison of Dynamic Vs. Static Load Balancing Policies in a Mainframe - Personal Computer Network Model | |
| A Performance Comparison of Dynamic Vs. Static Load Balancing Policies in a Mainframe - Personal Computer Network Model | |
| Numerical Studies on Braess-Like Paradoxes for Non-Cooperative Load Balancing in Distributed Computer Systems | |
| A Comparative Study of Static and Dynamic Individually Optimal Load Balancing Policies | |
| A Performance Comparison of Dynamic Vs. Static Load Balancing Policies in a Mainframe - Personal Computer Network Model | |
| Numerical Studies on Paradoxes in Non-Cooperative Distributed Computer Systems | |
| Numerical Studies on a Paradox for Non-Cooperative Static Load Balancing in Distributed Computer Systems | |
| Numerical Studies on a Paradox for Non-Cooperative dynamic Load Balancing in Distributed Computer Systems | |
| New Technique for Data Hiding | |
| A scalable distributed subgroup hierarchy protocol for secure multicast communication | |
| Braess Paradox in Non-Cooperative Dynamic Load Balancing for the Cohen-Kelly Computer Network Model | |
| Novel Technique for Data Hiding | |
| Security analysis and improvement of some nominative proxy signature schemes | |
| A Secure Nominative Proxy Signature Scheme for Distributed Shared Object Systems | |
| " How Harmful The Paradox Can Be In The Cohen-Kelly Computer Network Model Using A Non-Cooperative Dynamic Load Balancing Policy | |
| An Expert system for the Diagnosis and Treatment of psychiatric and Neurological Diseases | |
| A Scalable and Distributed Security Protocol for Multicast Communications | |
| An Intelligent AntNet-Based Algorithm for Efficient Secure Data Routing Over Peer to Peer Networks | |
| How good is the DES Algorithm in Image ciphering | |
| A Load Balancing policy for Heterogeneous Computational Grids | |
| Secure Group Re-Keying Using Key Inverses | |
| A Capacity-Based Load Balancing And Job Migration Algorithm For Heterogeneous For Heterogeneous Computational Grids | |
| A Two-Level Load Balancing Policy for Grid Computing | |
| A Hierarchical Load Balancing Policy For Grid Computing Environment | |
| Using Hybrid Particle Swarm Optimization to solve Machine Time Scheduling Problem with Random Starting Time | |
| An Efficient Algorithm for Resource Allocation in Parallel and Distributed Computing Systems | |
| A Novel Location Determination Technique for Traffic Control and Surveillance using Stratospheric Platforms | |
| An AntNet-based Load Balancing Algorithm for Grid Computing Environments | |
| A Survey of Load Balancing in High-Performance Distributed Computing Systems | |
| An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis | |
| New Region Growing based on Thresholding Technique Applied to MRI Data | |
| Chaos-based model for encryption and decryption of digital images | |
| A threshold-based load balancing algorithm for Grid Computing Systems | |
| Adaptive Difference Expansion-Based Reversible Data Hiding Scheme for Digital Images | |
| Efficient audio cryptosystem based on chaotic maps and double random phase encoding | |
| A Multi-Class Task Scheduling Strategy for Heterogeneous Distributed Computing Systems | |
| Chaos-based model for encryption and decryption of digital images | |
| Improved Hierarchical Key Management Scheme (IHKMS) with Three Phase Technique for Ad-Hoc Networks | |
| A Novel Approach for Color Image Segmentation Based on Region Growing | |
| A Neural Network-Based Learning Algorithm for Intrusion Detection Systems | |
| New Selection based Model for Filtering Heterogeneous Distributed Computing Systems Based on QoS Criteria and Load Balancing Polices | |
| CHOMK: Concurrent Higher-Order Mutants Killing Using Genetic Algorithm | |
| Transmission of Chaotic‑based Encrypted Audio through OFDM | |
| Small Details Gray Scale Image Encryption Using RC6 Block Cipher | |
| Performance Evaluation of Medical Segmentation Techniques for Cardiac MRI | |