IRECOS JOURNAL PDF

Items 1 – 21 of 21 IRE is a collection of peer-reviewed International Journals published by Praise International Review on Computers and Software (IRECOS). Home > Products > Journal and Reviews > S. > Latest issue. International Review on. Computers and Software (IRECOS) December ( Vol. 8 N. 12). IRECOS, the International Review on Computers and Software, was indeed discontinued by Scopus in due to “publication concerns”.

Author: Galmaran Dujora
Country: Austria
Language: English (Spanish)
Genre: Automotive
Published (Last): 15 September 2004
Pages: 383
PDF File Size: 19.14 Mb
ePub File Size: 18.31 Mb
ISBN: 619-8-55241-929-2
Downloads: 17116
Price: Free* [*Free Regsitration Required]
Uploader: Kazahn

Surrogate Object Based Mobile Transaction. Abstract – Learning objects retrieval is important for a variety of information needs and applications such as collection management, summary and analysis. We use CrossCheck to detect instances of overlapping and similar text in submitted manuscripts.

Furthermore deriving several results according to an adapted mathematical model of the Dead Sea. The data will not be sold by kournal journal or the publisher nor will it be used for purposes other jpurnal those stated here.

International Review on Computers and Software (IRECOS) | Publons

But, Genetic optimization algorithm has certain limitations such as slow convergence, less accuracy, etc. Object detection journa, tracking is a challenging task. The proposed processor is customized for the routing which is time-consuming phase. Abstract – Satellite images provide important information ircos earth surface, jiurnal area, weather and kournal phenomena.

Furthermore, it has a high legal value for document authentication, as well as being dependent on by both commercial transactions and governmental institutions. Watermarking of Medical Images with Optimized Biogeography.

Abstract – Cryptanalysis on GSR fair exchange protocol to study and analyse the robustness of the protocol. Security in Computer Systems and Networks Computer systems security, hardware and embedded systems security, security protocol design and analysis, cryptography and cryptanalysis, intrusion detection systems and techniques, user authentication techniques and systems. Abstract – In order to manage the growing amount of video information efficiently, a video scene segmentation method is necessary.

The Authors declare that all of the following requirements and duties have been fulfilled in preparation of the manuscript: By submitting your manuscript to this journal you accept that your manuscript may be screened for plagiarism against previously published works.

Submission Preparation Nournal As part of the submission process, the Authors are required to check off their submission’s compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines: A Cryptanalysis Approach on E-learning Security. An EEG recording is riecos affected with noises. A digital fundus image coordinate system is built to present an enhanced depiction of the features.

  04704 LEGRAND PDF

Abstract – In the domain of 3D face matching, many techniques have been developed as variants of 3D facial matching approaches that reduce the amount of facial data into few 3D curves.

Praise Worthy Prize – IRE Journals collection

This indicator counts the number of citations received by documents from a journal and divides them by the total number of documents published in that journal. Abstract – This paper presents a new technique for efficient searching with fuzzy criteria in very large information systems. We observed that based on their evaluation to obtain correct detection joournal tracking, Recursive detection algorithm and Mean shift tracking is used to track the detected objects in motion based video.

The parametric time-frequency technique used irfcos Periodogram PE.

International Review on Computers and Software (IRECOS)

The old network then performs the data transmission to the new network. Finger vein and palmprint biometric is a promising technology, now-a-days widely used because of its important features such as resistant to criminal tampering, high accuracy, ease of feature extraction and fast authentication speed. Irecod adaptive shrinking mechanism involves sending irecoos shrink packet along with the data packets, based on the parameters link quality, traffic rate and link change rate.

This research work presents a novel technique to deal with the security problems. The framework is based on random scheduling which reflect best throughput power distribution in multi-hop wireless systems. The 2-dimensional patterns of the signatures are used as training data for the radial basis function RBF network and echo state neural network ESNN.

By submitting the manuscript, the authors are confirming their agreement to the following Author Fees statements:. If these two challenges are solved, the performance and its applicability will be improved significantly.

International Review on Computers and Software

This paper reviews and evaluates various current frameworks of P2P botnets detection and analyzing the existing gaps to make improvement of P2P botnets detection framework. The presence of exudates is identified based on the variation in grey color presents in retina.

Journal Self-citation is defined as the number of citation from a journal citing article to articles published by the same journal.

The performance of proposed models have been evaluated and compared with existing models by simulation. The results obtained show that the ANFIS outperformed other denoising techniques in terms of localization of the components of the abnormal EEG signal.

So, it is necessary to prevent the exudates which act as a major challenge in diagnostic task. In CSTA, proportionate statistic of rows and columns are considered.

  HENSHALL KANJI PDF

A mobile device from anywhere in the wireless environment could utilize seamlessly a large computing power or any other resources in order to provide effective data and transaction process. Afterwards, the development of such ircos base will be used to help professional actors to accomplish their task in bringing knowledge of past projects.

During the time that the X-ray tube recovers to full voltage after an arc, image data is not collected and data projections are lost caused poor image quality in the journa, reconstruction process. Irecis extraction of exudates fluid is done by mutual region growing and edge recognition methods. The recognition of the optic disc is necessary in the exudates detection procedure irrecos both are related in terms of color, contrast, etc.

Starting the Submission You will ask to indicate that the submission is ready jokrnal be considered by the journal by checking off 5 items regarding ethical requirements for the authors such as originality and exclusiveness of the submission, acknowledgment of authorship and sources, absence of plagiarism and conflict of interest.

The revision of this difficulty has been restricted journa, to the non-convexity of the primary optimization complications that forbids a well-organized answer.

Data that will assist in developing this publishing platform may be shared with its developer in an anonymized and aggregated form, with appropriate exceptions such as article metrics. References linking to temporary online resources are not acceptable. The authors hereby give their consent for Praise Worthy Prize to process their personal data irexos compliance with the Privacy Policy they had sight of.

The suggested method, in this paper, of approximate search in very large files using the Pigeonhole Principle, circumvents the sequential search operations and reduces the calculations tremendously. The Author also warrants that the Work contains no libellous or unlawful statements, does not infringe on jokrnal right or privacy of others, or contain material or instructions that might cause harm or injury.

Abstract – Cryptography is effectively synonymous with the technique of encryption and also legally prioritized for secure communication. The data collected by these elements are sent to an administrator located at a base station who can react to specific situations by analyzing the data.