Most Accessed Articles

Optimization of Outdoor Video Surveillance

, 2015; 4(1): 16-39.

Omneya Issa, Wei Li, Hong Liu and Ron Renaud


DOI: 10.2174/2215081104666150730222334


Smart Wireless Sensor Network to Detect and Protect Sheep and Goats to Wolf Attacks

, 2013; 2(2): 91-101.

Sandra Sendra, Ferran Llario, Lorena Parra and Jaime Lloret


DOI: 10.2174/22117407112016660012


Optimal Throughput for Reliability and Stability in Wireless Multicast Communication

, 2014; 3(1): 2-8.

Thong Huynh, In-Yeup Kong and Won-Joo Hwang


DOI: 10.2174/2215081102666140623210159


Stability Analysis for a Class of Stochastic Fuzzy Cellular Neural Networks with Markovian Jumping and Mixed Time Delays

, 2014; 3(1): 55-61.

Jingyi Wang and Guoqiang Peng


DOI: 10.2174/2215081102666140620224251


Mobile 3D Secure Transmission Based on Anonymous Buyer-Seller Watermarking Protocol

, 2014; 3(1): 33-43.

Suk-Hwan Lee, Seong-Geun Kwon and Ki-Ryong Kwon


DOI: 10.2174/2215081102666140225004344


Towards the Design of Social Media to Promote Physical Activity

, 2014; 3(1): 25-32.

Yao Meng


DOI: 10.2174/2215081102666140225004735


Primer and Recent Developments on Fountain Codes

, 2013; 2(1): 2-11.

Jalaluddin Qureshi, Chuan Heng Foh and Jianfei Cai


DOI: 10.2174/22117407112019990001


An Efficient Token Passing Strategy in Improved Logical Ring Structure

, 2013; 2(1): 50-60.

Zhonglan Luo, Kai Lu and Xiaoping Wang


DOI: 10.2174/22117407112019990002


Webmaster Contact: info@benthamscience.org
Copyright © 2018 Bentham Science