Spam or unsolicited emails constitute a major threat to the Internet, the corporations, and the end-users. Statistics show that about 70% - 80% of the emails ar
The matching accuracy of the fingerprint templates which were generated by our previously proposed data processing method using the fractional Fourier transform
The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a
In this paper, the simulation studies of the radiation characteristics of modified dual segment rectangular dielectric resonator antenna (DSRDRA) in free space
A mobile ad hoc network (MANET) is composed of mobile nodes, which do not have any fixed wired communication infrastructure. This paper proposes a protocol call
Network congestion, one of the challenging tasks in communication networks, leads to queuing delays, packet loss, or the blocking of new connections. In this st