- 2014-12-15 10:55:33Euclidean 3D Reconstruction of Unknown Objects from Multiple Images
- 2014-12-15 10:44:29Performance Evaluation of WideMac Compared to ALOHA in term of Energy Consumption for IRUWB based WSN
- 2014-12-15 10:27:55Development of a New Slit-Slotted Shaped Microstrip Antenna Array for Rectenna Application
- 2014-12-11 18:05:36A WIFI Antenna Radiation Effects on Human Head in the ISM Band
- 2014-12-11 18:02:56MGI-LEACH: Multi Group LEACH Improved an Efficient Routing Algorithm for Wireless Sensor Networks
- 2014-12-11 17:58:23Crypto-Security Contribution in WSNs
- 2014-12-11 17:55:39Unified Approach for Building Heterogeneous Artifacts and Consistency Rules
- 2014-12-11 17:51:58Vocabulary Persona by using Ontologies
- 2014-12-11 17:48:30Semantic Technologies Applying to Data Warehouses Federation
- 2014-12-11 17:46:14Fuzzy Ontology Evolution: Classification of a New Individual
- 2014-12-11 17:40:04Reasoning on Hybrid Ontology Using Extended SWRL Rules
- 2014-12-10 15:34:49Modeling and Simulation of Efficient Cluster Based Manhattan Mobility Model for Vehicular Communication
- 2014-12-10 15:32:04An Attack Tree Based Comprehensive Framework for the Risk and Security Assessment of VANET using the Concepts of Game Theory and Fuzzy Logic
- 2014-12-10 15:29:42A Novel Approach for Iris Recognition in Unconstrained Environment
- 2014-12-10 15:26:57New Information Hiding Technique using Features of Image