Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Number of Articles: 10
Medical Image Recognition Using Artificial Neural Networks.
Volume 5, Issue 1 , June 2005, Page 1-17
Abstract
Read More ...Color Image Denoising Using Local Multiwavelet Filtering .
Volume 5, Issue 1 , June 2005, Page 18-28
Abstract
Read More ...A New Design for Linear Phase IIR Digital Filter with Efficient Realization
Volume 5, Issue 1 , June 2005, Page 29-41
Abstract
Abstract: Linear phase requirement can be achieved by direct design with an FIR filter at the expense of high order and high computational burden for the given specification. Alternatively, IIR digital filters can be designed with much smaller order than their FIR counterparts, but at the expense ... Read More ...SECURITY SERVICES PROVISION AND ENHANCEMENT IN CLIENT/SERVER NETWORKS USING AES
Volume 5, Issue 1 , June 2005, Page 42-57
Abstract
Abstract: The paper attempts to provide most of the well-known security services through a design and implementation of a client/server-based network security system. The system is based on recommendation of the Advanced Encryption Standard (AES) together with some secure techniques. These techniques ... Read More ...Systolic Digital Filter Architecture for Signal Identification
Volume 5, Issue 1 , June 2005, Page 58-64
Abstract
Abstract: The concern of the paper is to use novel approach to identify the signal. The approach represents the relation ship between the input and output through the systolic array structure, and drivers the relation directly from the transfer function of the digital filter, so that signal identification ... Read More ...A Proposed Firewall Security Method against Different Types of Attacks
Volume 5, Issue 1 , June 2005, Page 65-74
Abstract
Abstract: There are measures that can be taken to protect users from objectionable or inappropriate Internet content and secure the LAN from theft, modification, or deletion of data. Firewall is one of many security measures that can be used to protect networks. Although firewalls are powerful, they ... Read More ...An Error Concealment Algorithm Using Discrete Wavelet Transform
Volume 5, Issue 1 , June 2005, Page 75-87
Abstract
Abstract: A new algorithm for error concealment of a completely lost blocks using the 1-D discrete wavelet transform is proposed in this paper. The transmission of block-coded images, fading in wireless channels can cause errors in entire blocks and consequently causes the loss of information of ... Read More ...Detection of Code – Division Multiple Access Signals based on Neural Network
Volume 5, Issue 1 , June 2005, Page 88-93
Abstract
Abstract: Artificial Neural Networks are employed for demodulation of spread spectrum signals in a multiple – access environment. In fact, the conventional matched filter receiver, when used in multi-user system, suffers from the interfering signals, so that when reducing this problem, we need ... Read More ...Genetic Algorithm and Elman Network Used For Tuning The Parameters Of The PID Neural Controller Based Model Reference
Volume 5, Issue 1 , June 2005, Page 94-109
Abstract
Abstract: A neural network-based self-tuning PID controller is presented. The scheme of the controller is based on using a modified Elman recurrent neural network as a selftuner for (PID) controller. The proposed method has the advantage of not necessarily using a combined structure of identification ... Read More ...Image files formats and Measuring Image Quality A comparative study and analysis of commonly used image file formats
Volume 5, Issue 1 , June 2005, Page 110-126