On Enhancing Genetic Algorithms Using New Crossovers
|
Written by Esra'a Alkafaween |
Hits: 563
|
DETECTING DISTRIBUTED DENIAL OF SERVICE ATTACKS USING DATA MINING TECHNIQUES
|
Written by Al-Kasassbeh, M; Al-Naymat, Gh; Hassanat, A; Almseidin, M |
Hits: 1940
|
BYPASSING CAPTCHA BY MACHINE—A PROOF FOR PASSING THE TURING TEST
|
Written by hasanat |
Hits: 1943
|
Video PowerSearcher: A Text-Based Indexing E-Learning System
|
Written by dr.Moaath Hajaya , dr.Farhan Obisat,dr. Azzam Sleit |
Hits: 2369
|
Image Error Recovery in Fax Transmission Using Data-prediction Methodology with JB
|
Written by Mohammad Abbadi |
Hits: 2675
|
A New Message Authentication Technique using Zingzag Manipulation and Block Chaini
|
Written by Mohammad A. Abbadi |
Hits: 2844
|
Performance Evaluation of Queuing Networks with Finite Capacity and non-exponential Distribution u..
|
Written by Aymen I. Zreikat |
Hits: 2552
|
Performance of Queueing model of One UMTS cell with R virtual zones by the Maximum Entropy Solution
|
Written by Aymen I. Zreikat |
Hits: 3063
|
Capacity Bounds Analysis of switched Beam Smart Antennas in CDMA Systems
|
Written by Ismat Al-Dmour, Khalid-Al-Begain, Aymen I. Zreikat |
Hits: 2227
|
Comparative Capacity/Coverage Analysis of CDMA Cell in Different Propagation Environments
|
Written by Zreikat A. and Al-Begain K., Smith, K |
Hits: 2273
|