يعرض هذا البحث أهم مقولات التحديث المعاصرة التي أسهمت بفاعلية في رسم ملامح التنمية المركَّبة في اليابان. وينطلق الباحث من أن التجربة اليابانية المعاصرة في التنمية المركَّبة تغذَّت من عناصر ا
In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs). In the early days of sensor networks, public key cryptography was thought to be completely unfeasible considering its computational complexity and energy requirements. By this time, several works have proved that the lightwei
Chip morphology and segmentation play a predominant role in determining Machinability and Chatter during the machining operation of materials. The chip shape and size varies widely in machining operations. Problems with surface finish, work-piece accuracy, chatter and tool life can be caused even due to minor changes in the chip formation process,
A Mobile Ad Hoc Network (MANET) represents a system of wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary network topologies without the presence of any fixed communication infrastructure. Reliable routing and robustness of the network are two important issues for MANETs. In this paper we propose Neighb
Chatter is an unwanted but sometimes unavoidable phenomenon in computer aided machining. The term defines the self-excited violent relative dynamic motion between the cutting tool and workpiece. Experimental investigations have been conducted on the chips and common types of discreteness in the form of serrated saw teeth have been identified. It ha
Abstract. In this paper, we consider a problem on finding the number of different single connected component containing a fixed root for a given number of vertices on semi-infinite Cayley tree. The solution of this problem is the well known Catalan numbers. The result is then extended to the complete graph. Then, we gave a suitable estimate for the
The output parameter of the model was surface roughness. For this interpretation, advantages of statistical experimental design technique, experimental measurements, artificial neural network were exploited in an integrated manner. Cutting experiments are designed based on statistical three-level full factorial experimental design technique. A pred
The intent of this paper is to present the flaws and weaknesses of Kim et al.'s timestamp-based password authentication scheme using smart cards. We prove that, in spite of the improvement of Yang-Wang-Chang's scheme, Kim et al.'s solution is still vulnerable to a type of forgery attack. We also note down how the flaw could be overcome
Ann innovative FI address scheme is discussedTechnical Report 2008N4-SP-NL, December 11, 2008 Final Report Future Internet Addressing (FI Address) Networking Lab, KHU Date : 19 December, 2008 E-Mail : spathan@networking.khu.ac.kr 1. INTRODUCTION The architecture and operational methods of Future Internet (FI) are not yet clear. So, proposing any sp
This book starts off with Chapter 1 which introduces us to qualitative research, an approach that does not deal with numbers per se, but, has guidelines and a systematic approach within a theoretical framework or design. The chapter also discusses the characteristics of qualitative research; and the differences between qualitative and quantitative