International Journal of Communications and Information Technology
مرور بر اساس
ارسال های اخیر
- 
A Block-Grouping Method for Image Denoising by Block Matching and 3-D Transform Filtering (University of Sistan and Baluchestan, 2012-12-01)Image denoising by block matching and threedimensionaltransform filtering (BM3D) is a two steps state-ofthe-art algorithm that uses the redundancy of similar blocks innoisy image for removing noise. Similar ...
 
- 
A Novel Small E–Ring Shaped Monopole Antenna with Dual Band-Notch Function for UWB Wireless Communications (University of Sistan and Baluchestan, 2012-12-01)This paper presents an E-ring shaped printed monopole antenna for UWB applications with dual notched bands performance. In order to generate single frequency band notch function, we applied a U-ring shaped monopole antenna, ...
 
- 
Add-Drop and Channel-Drop Optical Filters Based on Photonic Crystal Ring Resonators (University of Sistan and Baluchestan, 2012-12-01)Here, we propose an add-drop and a channel drop filter based on two-dimensional photonic crystal all circular ring resonators. These structures are made of a square lattice of silicon rods with the refractive index n1=3.464 ...
 
- 
Watermarking Scheme Based on Multiple Chaotic Maps (University of Sistan and Baluchestan, 2012-12-01)a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear ...
 
- 
Users as the Biggest Threats to Security of Health Information Systems (University of Sistan and Baluchestan, 2012-12-01)There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS's especially in Health Information Systems (HIS), it is still necessary ...
 
- 
Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks (University of Sistan and Baluchestan, 2011-12-01)Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they are
 
- 
Simulation and Analysis the Performance of 3970 Km DWDM Transmission Link Employing Optimized Semiconductor Optical Amplifiers (University of Sistan and Baluchestan, 2011-12-01)In this paper first we try to analysis the behavior ofthe SOAs in the optical networks and then have proposed anumerical simple model to simulate the behavior of thesemiconductor optical amplifiers. After ...
 
- 
Monte Carlo Simulation of Multiplication Factor in PIN In0.52Al0.48As Avalanche Photodiodes (University of Sistan and Baluchestan, 2011-12-01)In this paper, we calculate electron and hole impactionization coefficients in In0.52Al0.48As using a Monte Carlo modelwhich has two valleys and two bands for electrons and holesrespectively. Also, we ...
 
- 
Secure Routing Protocol: Affection on MANETs Performance (University of Sistan and Baluchestan, 2011-12-01)In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as ...
 
- 
A Full-Fuzzy Rate Controller for Variable Bit Rate Video (University of Sistan and Baluchestan, 2011-12-01)In this paper, we propose a new full-fuzzy video ratecontrol algorithm (RCA) for variable bit rate (VBR) videoapplications. The proposed RCA provides high qualitycompressed video with a low degree ...
 



