This paper analyzed the security of constant dimensional subspace code against wiretap attacks. The security was measured in the probability with which an eaves
Cloud computing is touted as the next big thing in the Information Technology (IT) industry, which is going to impact the businesses of any size and yet the sec
As security is essential in communications through electronic networks, development of structures providing high levels of security is needed. Public Key Infras
Privacy preserving data mining (PPDM) has become more and more important because it allows sharing of privacy sensitive data for analytical purposes. A big numb
Efficiency of the autofocusing algorithm implementations based on various orthogonal transforms is examined. The algorithm uses the variance of an image acquire
Cyber security is an important element of national security and the safekeeping of a nation’s constituency and assets. In Saudi Arabia, the point of interest o
An Extrinsic Fabry-Perot Interferometric (EFPI) fiber optical sensor system is an online testing system for the gas density. The system achieves the measurement