Volume 17, No 2, 2020


Secure Message Broadcasting in VANET Using RSU based Authentication and Cascade Encryption

T. Kirthiga Devi, R. Mohanakrishnan and T. Karthick

Pages: 706-716

DOI: 10.14704/WEB/V17I2/WEB17062

Full Text


Epileptic Seizures Prediction Using Deep Learning Methods on EEG Recordings

G. Maragatham, T. Kirthiga Devi, P. Savaridassan and Sachin Garg

Pages: 717-734

DOI: 10.14704/WEB/V17I2/WEB17063

Full Text


Self - Adaptive Load Balancing Using Live Migration of Virtual Machines in Cloud Environment

V. Lavanya, M. Saravanan and E.P. Sudhakar

Pages: 735-745

DOI: 10.14704/WEB/V17I2/WEB17064

Full Text


A Low Computational Complexity Algorithm of PTS Technique for PAPR Reduction in the 4G and 5G Systems

Raghda Abdulbaqi Mugher

Pages: 746-775

DOI: 10.14704/WEB/V17I2/WEB17065

Full Text


Comparative Analysis of Machine Learning Techniques for Splitting Identifiers within Source Code

Abeer Abdulsalam and Nazre Abdul Rashid

Pages: 776-787

DOI: 10.14704/WEB/V17I2/WEB17066

Full Text


A Robot Obstacle Avoidance Method based on Random Forest HTM Cortical Learning Algorithm

Ahmed Mahdi Abdulkadium

Pages: 788-803

DOI: 10.14704/WEB/V17I2/WEB17067

Full Text


Blurred Facial Expression Recognition System by Using Convolution Neural Network

Elaf J. Al Taee and Qasim Mohammed Jasim

Pages: 804-816

DOI: 10.14704/WEB/V17I2/WEB17068

Full Text


A Novel Approach by Using a New Algorithm: Wolf Algorithm as a New Technique in Cryptography

Basim Najim Al-din, Ahmad M. Manasrah and Salam Abdulkhaleq Noaman

Pages: 817-826

DOI: 10.14704/WEB/V17I2/WEB17069

Full Text


A Multiple Handover Method by Using the Guide of Mobile Node

Radhwan Mohamed Abdullah, Radhwan Basher and Ayad Hussain Abdulqader

Pages: 827-847

DOI: 10.14704/WEB/V17I2/WEB17070

Full Text


Design and Implementation of Healthcare Patient based General Packet Radio Service

Ahmed A. Radhi

Pages: 848-861

DOI: 10.14704/WEB/V17I2/WEB17071

Full Text




Prev1234567Next