A Review on Multimedia Communications Cryptography
Yasser Salem, Mohamed Abomhara, Othman O. Khalifa, A.A. Zaidan and B.B. Zaidan
Research Journal of Information Technology Volume 3, Number 3, 146-152, 2011
Abstract PDF Fulltext Citations XML References
A Novel Document Ranking Algorithm That Supports Mobile Healthcare Information Access Effectiveness
K. Agbele, A. Adesina, N.A. Azeez, A. Abidoye and R. Febba
Research Journal of Information Technology Volume 3, Number 3, 153-166, 2011
Abstract PDF Fulltext Citations XML References
Energy Holes Mitigation Techniques in Sink's Proximity using Sensor Deployment in Wireless Sensor Networks
Atiq- Ur-Rahman, Halabi Hasbullah and Omar U. Khan
Research Journal of Information Technology Volume 3, Number 3, 167-180, 2011
Abstract PDF Fulltext Citations XML References
Grid Security: Evaluation of Active and Passive Attacks with Proposed Countermeasures
Nureni Ayofe Azeez, Iyamu Tiko, Isabella M. Venter, O.F.W Onifade and R.A. Azeez
Research Journal of Information Technology Volume 3, Number 3, 181-190, 2011
Abstract PDF Fulltext Citations XML References
UDCA: Energy Optimization in Wireless Sensor Networks Using Uniform Distributed Clustering Algorithms
A.P. Abidoye, N.A. Azeez, A.O. Adesina and K.K. Agbele
Research Journal of Information Technology Volume 3, Number 3, 191-200, 2011
Abstract PDF Fulltext Citations XML References
Comparative Analysis of Flipped Exponential Pulse with Square Root Raised Cosine for WCDMA Using Digital Filtering Approach
Research Journal of Information Technology Volume 3, Number 3, 201-206, 2011
Abstract PDF Fulltext Citations XML References