AUST, Loading Knowledge...

Research

Informatics Engineering

Improved Algorithm Steganography For Using Technology Puzzle

Read More

An Algorithm Proposed To Hide , Encrypt and Compress A Large Image In Multiple Images LSB Technology

Read More

Analysis and Performance Evaluation of OpenFlow Controller in SDN using N-Policy

Read More

An analytical study of the design and performance of an antivirus program

Read More

Comparison of different GPT versions and study of the effectiveness of CAHTGPT in the medical sector

Read More

New Technology to Hide a File in Multiple Images Using the Cut Map

Read More

Development of hybrid encryption algorithms

Read More

Design and test of anti – virus program

Read More

An Algorithm Developed For the Watermark Using the Cut Map

Read More

New Technology To Compress, Encrypt And Hide A File In Several Images Using Puzzle Technology

Read More

System Design to Recognize of Time Plans Labels Using Neoural Networks

Read More

Proposing Algorithem to extract Value of Industrial Counter from Image of Pulse Plan

Read More

Study The Impact of the Scheduling Algorithms on the Performance of Routing Protocols in Mobile Wireless Networks

Read More

Increasing Input Block and Encryption Efficiency by Mixing BBM & IDEA

Read More

Quality of Service Evaluation of Constant Data and MPEG-4 Frames using IEEE 802.11e and IEEE 802.11 in Mobile Wireless Networks

Read More

Comparing the performance of service and neighbor discovery protocols in D2D technology

Read More

Quality of Service of Routing Protocols in VANETs

Read More

Improving discovery rate in device-to-device (D2D) communications Using Power control technique

Read More

Enhanced Routing Protocols in Mobile Wireless Networks

Read More

Development of a Data Encryption Algorithm to Enhance Security in D2D Communications by Secure Key Exchange

Read More

Multipath Routing Protocols in Mobile Wireless Networks

Read More

Improving Performance of 4G Networks by Allocating Resources in D2D Communications

Read More

Secure Suggested Method for Medical Images Transmission in DICOM Standard

Read More

A Comparative Study of the Algorithms used to Plagiarism Detection

Read More

Real-time Monitoring System for the Development of Interactive E-learning System in Higher Education Institutions

Read More

Analytical Study to Check the Validity of The Test Metric LOC

Read More

SLOC the Base Unit to Derive Metrics and Essential Input for Cost Estimation Models

Read More

The Effect of Software Testability Metrics on Software Testing‏

Read More

Predict Class Testability Using Source Code Complexity Metrics‏

Read More

إنشاء شبكة تبادل المعطيات في وزارة التربية

Read More

الاستثمار الأمثل للشبكات المحلية باستخدام VLAN‏

Read More

Building a Herbal Medicine Ontology Aligned with Symptoms and Diseases Ontologies

Read More

Enhanced RSA Cryptosystem Based On four Prime Numbers

Read More

JAVA Program For Texts Encryption Using Modified RSA Algorithm

Read More

The Encryption Using Pythagorean Matrix

Read More

Analyze Android Applications to Build a Model that Represents Application Components and How they Interact With Each Other

Read More

Comparison of Web Services Composition Design Models

Read More

Testing MapReduce Applications

Read More

Develop a Software Library to Test Big Data Applications in a Simulated Hadoop Environment

Read More

Generate Test Cases for GUI Applications using Artificial Bee Colony Algorithm

Read More

Mobility adaptive clustering algorithm for wireless sensor networks with mobile nodes

Read More

Image Encryption Using RSA based on Large Prime Number

Read More

Detection of Black Hole attack in MANETS using IDSAODV and Reverse AODV

Read More

Studying the Effect of Changing the Security Techniques Used in the MS-LEACH Protocol on the Energy Consumed in WSN Networks

Read More

Propose a New Routing Protocol (VC-LEACH) to Reduce the Consumed Energy in WSNs

Read More

Reducing the Consumed Energy in the Dynamic Clustering for Wireless Sensor Networks

Read More

Performance Evaluation of Hierarchical Routing Protocols in Homogeneous and Heterogeneous Wireless Sensor Networks

Read More

Robust Adaptive Beamforming Based on Convex Optimization with Variable Diagonal Loading

Read More

Improve the robustness of MVDR beamforming method based on steering vector estimation and sparse constraint

Read More

Hybrid Beamforming in 5G Network using Singular Value Decomposition

Read More

Study and compare Improvement The Algorithms of improvement the MVDR Beamforming

Read More

Study and Comparison The Performance of Channel Estimation in MIMO-OFDM When We Use STBC

Read More

Improve the Random Access in IEEE802.11 ad To accommodate the increase in the number of users in IoT applications

Read More

Energy-efficient Fault-tolerant Scheduling of Parallel Applications on Distributed Real-time Systems

Read More

Energy-efficient Scheduling based on Reliability and Deadline of Parallel Applications in Distributed Real-time Systems

Read More

A Reference Study of consensus Algorithms in Extended Distributed Systems

Read More

Study, Build and Analyze CAN 2.0 Network Model Using MATLAB

Read More

Study and Build a CAN FD Network Model and Compare its Performance with CAN 2.0

Read More

Analyzing the attack on Internet Control Messages Protocol in IPv6 (ICMPv6)

Read More

A proposed High Resolution Method for Medical DICOM Images Compression using Deep Learning

Read More

Developing Protection techniques from attacks in IPv6

Read More

Studying the Recoding Algorithm and User Scheduling in Multibeam MultigroupSatellite Network

Read More

Evaluating of energy and cost saving in Cloud Radio Access Networks C-RAN

Read More

Internet of Things-IOT: Definition, Architecture and Applications

Read More

Visibility Graph of a Set of Line Segments: A Dynamic Sequential Algorithm and Its Parallel Version

Read More

Robust Watermarking Algorithm

Read More

Improve the Performance of Advice Systems Based on Cooperative Liquidation Using Trust Relationships

Read More

Motion planning in unknown environment

Read More

Detection of the Arabic letters using convolutional neural networks

Read More

A review of the most important Word Embedding Techniques in Natural Language Processing

Read More

Analytical study of methods for identifying some skin diseases

Read More

Applying Transfer Learning in image classification

Read More

Using DWT to Include Digital Watermark in Audio

Read More

Analytical study of methods of detecting counterfeit currency

Read More

New Approach to Identify Some Skin Diseases

Read More

Performance Analysis in Software Defined Networks (SDNs)

Read More

Performance Analysis of Software Defined Networks Controllers: POX and Opendaylight

Read More