| عنوان البحث | ملخص البحث | 
							| A Performance Comparison of Dynamic Vs. Static Load Balancing Policies in a Mainframe - Personal Computer Network Model |  | 
							| A Performance Comparison of Dynamic Vs. Static Load Balancing Policies in a Mainframe - Personal Computer Network Model |  | 
							| Numerical Studies on Braess-Like Paradoxes for Non-Cooperative Load Balancing in Distributed Computer Systems |  | 
							| A Comparative Study of Static and Dynamic Individually Optimal Load Balancing Policies |  | 
							| A Performance Comparison of Dynamic Vs. Static Load Balancing Policies in a Mainframe - Personal Computer Network Model |  | 
							| Numerical Studies on Paradoxes in Non-Cooperative Distributed Computer Systems |  | 
							| Numerical Studies on a Paradox for Non-Cooperative Static Load Balancing in Distributed Computer Systems |  | 
							| Numerical Studies on a Paradox for Non-Cooperative dynamic Load Balancing in Distributed Computer Systems |  | 
							| New Technique for Data Hiding |  | 
							| A scalable distributed subgroup hierarchy protocol for secure multicast communication |  | 
							| Braess Paradox in Non-Cooperative Dynamic Load Balancing for the Cohen-Kelly Computer Network Model |  | 
							| Novel Technique for Data Hiding |  | 
							| Security analysis and improvement of some nominative proxy signature schemes |  | 
							| A Secure Nominative Proxy Signature Scheme for Distributed Shared Object Systems |  | 
							| " How Harmful The Paradox Can Be In The Cohen-Kelly Computer Network Model Using A Non-Cooperative Dynamic Load Balancing Policy |  | 
							| An Expert system for the Diagnosis and Treatment of psychiatric and Neurological Diseases |  | 
							| A Scalable and Distributed Security Protocol for Multicast Communications |  | 
							| An Intelligent AntNet-Based Algorithm for Efficient Secure Data Routing Over Peer to Peer Networks |  | 
							| How good is the DES Algorithm in Image ciphering |  | 
							| A Load Balancing policy for Heterogeneous Computational Grids |  | 
							| Secure Group Re-Keying Using Key Inverses |  | 
							| A Capacity-Based Load Balancing And Job Migration Algorithm For Heterogeneous For Heterogeneous Computational Grids |  | 
							| A Two-Level Load Balancing Policy for Grid Computing |  | 
							| A Hierarchical Load Balancing Policy For Grid Computing Environment |  | 
							| Using Hybrid Particle Swarm Optimization to solve Machine Time Scheduling Problem with Random Starting Time |  | 
							| An Efficient Algorithm for Resource Allocation in Parallel and Distributed Computing Systems |  | 
							| A Novel Location Determination Technique for Traffic Control and Surveillance using Stratospheric Platforms |  | 
							| An AntNet-based Load Balancing Algorithm for Grid Computing Environments |  | 
							| A Survey of Load Balancing in High-Performance Distributed Computing Systems |  | 
							| An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis |  | 
							| New Region Growing based on Thresholding Technique Applied to MRI Data |  | 
							| Chaos-based model for encryption and decryption of digital images |  | 
							| A threshold-based load balancing algorithm for Grid Computing Systems |  | 
							| Adaptive Difference Expansion-Based Reversible Data Hiding Scheme for Digital Images |  | 
							| Efficient audio cryptosystem based on chaotic maps and double random phase encoding |  | 
							| A Multi-Class Task Scheduling Strategy for Heterogeneous Distributed Computing Systems |  | 
							| Chaos-based model for encryption and decryption of digital images |  | 
							| Improved Hierarchical Key Management Scheme (IHKMS) with Three Phase Technique for Ad-Hoc Networks |  | 
							| A Novel Approach for Color Image Segmentation Based on Region Growing |  | 
							| A Neural Network-Based Learning Algorithm for Intrusion Detection Systems |  | 
							| New Selection based Model for Filtering Heterogeneous Distributed Computing Systems Based on QoS Criteria and Load Balancing Polices |  | 
							| CHOMK: Concurrent Higher-Order Mutants Killing Using Genetic Algorithm |  | 
							| Transmission of Chaotic‑based Encrypted Audio through OFDM |  | 
							| Small Details Gray Scale Image Encryption Using RC6 Block Cipher |  | 
							| Performance Evaluation of Medical Segmentation Techniques for Cardiac MRI |  |