IRECOS JOURNAL PDF

Items 1 – 21 of 21 IRE is a collection of peer-reviewed International Journals published by Praise International Review on Computers and Software (IRECOS). Home > Products > Journal and Reviews > S. > Latest issue. International Review on. Computers and Software (IRECOS) December ( Vol. 8 N. 12). IRECOS, the International Review on Computers and Software, was indeed discontinued by Scopus in due to “publication concerns”.

Author: Daikree Nim
Country: Swaziland
Language: English (Spanish)
Genre: Software
Published (Last): 13 December 2017
Pages: 137
PDF File Size: 3.4 Mb
ePub File Size: 3.65 Mb
ISBN: 314-7-16790-308-8
Downloads: 30279
Price: Free* [*Free Regsitration Required]
Uploader: Mikazil

During the time that the X-ray tube recovers to full voltage after an arc, image data is not collected and data projections are lost caused poor image quality in the tomography reconstruction process. The features extracted from the preprocessed finger vein and palmprint images using Contourlet Transform reduce the overall dimensionality and computational complexity. This paper analyzes the performance of these schemes in journsl sensor networks by considering a data collection scenario with a set of performance metrics.

The concentrated effort of the research community in the last few years resulted in many approaches for data clustering that progressed the irecoa quickly in a few years. But, digital watermarking has its own limitations wherein the insertion of the original information into the cover image and identification of the exact location without degradation of the original image quality is difficult. Abstract – The functions of digital signature and public key encryption are simultaneously fulfilled by signcryption, which is a cryptographic primitive.

The security issue is a captious area in grid journaal.

Future directions of this review are to develop the P2P botnets detection system that has capability in high detection accuracy and efficiency. Furthermore, it has a high legal value for document authentication, as well as being dependent on by both commercial transactions and governmental institutions. All these companies reported satisfaction with their participation.

The performance of proposed models have been evaluated and compared with existing models by simulation. Articles are freely available to both subscribers and the wider public with permitted reuse. In Online Task Placement of Reconfigurable Computing platforms, the tasks are precompiled as rectangles with fixed height and width.

The main findings are the calculated 60 km2 shrinkage and the 18 meters decline over the study period. In addition to this, a method has been proposed jourjal detection of congestion in the selected paths.

TOP Related Posts  BERNSTEIN PRELUDE FUGUE AND RIFFS PDF

International Review on Computers and Software

To assess the performance of this method, we compared with conventional clustering methods. Journal Self-citation is defined as the number of citation from a journal citing article to articles published by the same journal. Finger vein and palmprint biometric is a promising technology, now-a-days widely used because of its important features such as resistant to criminal tampering, high accuracy, ease of feature extraction and fast authentication speed.

Praise Worthy Prize Homepage. Any content you submit to the RTI Research Community Portal, including personal information, is not subject to the protections which may be afforded to information collected under other sections of RTI’s Web site. Many techniques have been developed for iris recognition so far. We demonstrate the power distribution result through mathematical analysis and perform numerous extensions for the measured difficulty. This approach can be utilized with different embodiments, but the most effective realization would be to amplify some already given intrinsic approximate matching capabilities, like those in the FuzzyFind method [1][2].

Style We accepts papers in Microsoft Word. A lookup table is integrated into the proposed framework. Abstract – Cryptography is effectively synonymous with the technique of encryption and also legally prioritized for secure communication. With the help of existing work, the large data will be converted to annotation object so that the matching process with the input query will be reduced and the complexity of handling big data will be also reduced.

Due to non-stationary nature of the EEG signal, the uses of time-frequency techniques are inevitable.

Gaudiot, Minimizing the runtime partial reconfiguration overheads irecoa reconfigurable systems, The Journal of Supercomputing, Vol. In this paper we use clustering techniques in the video processing field to discover the video scene segmentation. Skip to main content. We present a distributed framework that guarantees maximum throughput. To overcome this journak MANETs needs a cross layer based congestion control technique that considers the hops and energy consumption during the transmission.

The chart shows the evolution of the average number of times documents published in a journal in the past two, three and four years have been cited in the current year. Please note that papers must be correctly formatted in order to be accepted.

International Review on Computers and Software

Abstract – Cryptanalysis on GSR fair exchange protocol to study and analyse the robustness of the protocol. Healthcare and BioInformatics, and emerging application domains, e.

TOP Related Posts  75176B DATASHEET PDF

The performance done in this paper will be irscos in choosing an optimal protocol based on these schemes for deployment of a network as well as for developing a new medium access protocol. First, depth-level curves were extracted to present journxl facial data then, we investigate the dimensionality reduction offered by Random Projection to perform an artificial system for face recognition using Back-propagation neural network. To further assess the obtained igecos the bootstrap hypothesis statistical technique is used to clarify the results.

Here, for the security purpose, we introduce the three games and we proved the attackers fail to find the security attributes of our proposed signcryption algorithm. Due to these challenges, data loss, frequent disconnection, unpredicted number of wireless and wired access and high transaction aborts has occurred in data and transaction management over distributed mobile paradigm. A various techniques has studied before like morphological approach, region growing approach and so on for the detection of automatic diabetic retinopathy.

Computational Intelligence, Machine Learning and Data Analytics Human computer interaction, computational science, pattern recognition, computer vision, speech processing, machine intelligence and reasoning, web science, databases, information retrieval, visualisation, current applications domains, e. The system consists of three stages. Jourrnal Year Value Uncited documents 0 Uncited documents 71 Uncited documents Ifecos documents Uncited documents Uncited documents Uncited documents Uncited documents Uncited documents Cited documents 0 Cited documents 23 Cited documents 80 Cited documents Cited documents Cited documents Cited documents Cited documents Cited documents International Collaboration accounts for the articles that have been produced by researchers from several countries.

The Authors declare that none of the following abuse was committed in preparation of the manuscript: This journal offers authors two choices to publish their manuscript: Many techniques have been proposed lrecos mine the frequent rules from the database, but it consider only the frequency value to decide whether the extracted rule is frequent are not.