عنوان البحث | ملخص البحث | Research Abstract |
A Performance Comparison of Dynamic Vs. Static Load Balancing Policies in a Mainframe - Personal Computer Network Model | | |
A Performance Comparison of Dynamic Vs. Static Load Balancing Policies in a Mainframe - Personal Computer Network Model | | |
Numerical Studies on Braess-Like Paradoxes for Non-Cooperative Load Balancing in Distributed Computer Systems | | |
A Comparative Study of Static and Dynamic Individually Optimal Load Balancing Policies | | |
A Performance Comparison of Dynamic Vs. Static Load Balancing Policies in a Mainframe - Personal Computer Network Model | | |
Numerical Studies on Paradoxes in Non-Cooperative Distributed Computer Systems | | |
Numerical Studies on a Paradox for Non-Cooperative Static Load Balancing in Distributed Computer Systems | | |
Numerical Studies on a Paradox for Non-Cooperative dynamic Load Balancing in Distributed Computer Systems | | |
New Technique for Data Hiding | | |
A scalable distributed subgroup hierarchy protocol for secure multicast communication | | |
Braess Paradox in Non-Cooperative Dynamic Load Balancing for the Cohen-Kelly Computer Network Model | | |
Novel Technique for Data Hiding | | |
Security analysis and improvement of some nominative proxy signature schemes | | |
A Secure Nominative Proxy Signature Scheme for Distributed Shared Object Systems | | |
" How Harmful The Paradox Can Be In The Cohen-Kelly Computer Network Model Using A Non-Cooperative Dynamic Load Balancing Policy | | |
An Expert system for the Diagnosis and Treatment of psychiatric and Neurological Diseases | | |
A Scalable and Distributed Security Protocol for Multicast Communications | | |
An Intelligent AntNet-Based Algorithm for Efficient Secure Data Routing Over Peer to Peer Networks | | |
How good is the DES Algorithm in Image ciphering | | |
A Load Balancing policy for Heterogeneous Computational Grids | | |
Secure Group Re-Keying Using Key Inverses | | |
A Capacity-Based Load Balancing And Job Migration Algorithm For Heterogeneous For Heterogeneous Computational Grids | | |
A Two-Level Load Balancing Policy for Grid Computing | | |
A Hierarchical Load Balancing Policy For Grid Computing Environment | | |
Using Hybrid Particle Swarm Optimization to solve Machine Time Scheduling Problem with Random Starting Time | | |
An Efficient Algorithm for Resource Allocation in Parallel and Distributed Computing Systems | | |
A Novel Location Determination Technique for Traffic Control and Surveillance using Stratospheric Platforms | | |
An AntNet-based Load Balancing Algorithm for Grid Computing Environments | | |
A Survey of Load Balancing in High-Performance Distributed Computing Systems | | |
An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis | | |
New Region Growing based on Thresholding Technique Applied to MRI Data | | |
Chaos-based model for encryption and decryption of digital images | | |
A threshold-based load balancing algorithm for Grid Computing Systems | | |
Adaptive Difference Expansion-Based Reversible Data Hiding Scheme for Digital Images | | |
Efficient audio cryptosystem based on chaotic maps and double random phase encoding | | |
A Multi-Class Task Scheduling Strategy for Heterogeneous Distributed Computing Systems | | |
Chaos-based model for encryption and decryption of digital images | | |
Improved Hierarchical Key Management Scheme (IHKMS) with Three Phase Technique for Ad-Hoc Networks | | |
A Novel Approach for Color Image Segmentation Based on Region Growing | | |
A Neural Network-Based Learning Algorithm for Intrusion Detection Systems | | |
New Selection based Model for Filtering Heterogeneous Distributed Computing Systems Based on QoS Criteria and Load Balancing Polices | | |
CHOMK: Concurrent Higher-Order Mutants Killing Using Genetic Algorithm | | |
Transmission of Chaotic‑based Encrypted Audio through OFDM | | |
Small Details Gray Scale Image Encryption Using RC6 Block Cipher | | |
Performance Evaluation of Medical Segmentation Techniques for Cardiac MRI | | |