Issue 1 of Volume 83

An Evolutionary Approach for Solving the N-Jobs M-Machines Permutation Flow-Shop Scheduling Problem with Break-Down Times

Authors: Armando Rosas-Gonzalez, Dulce-Maria Clemente-Guerrero, Santiago-Omar Caballero-Morales, Jorge-Carmen Flores-Juan

Stream Ciphers: A Comparative Study of Attacks and Structures

Authors: Daniyal M. Alghazzawi, Syed Hamid Hasan, Mohamed Salim Trigui

Accurate and Robust Identifying Forged Region Method in Scanned Images

Authors: Zeinab F. Elsharkawy, Safey A. Abdelwahab, Sayed M. Elaraby, Moawad I. Dessouky, Fathi E. Abd El-Samie

Performance Analysis of Key Establishment Protocols for Secure System

Authors: Tej Bahadur Shahi, Narendra Bahadur Bohara

Modified Hot Well Level Control System using Basic Logic Gates

Authors: S. Chandrakanth Sagar, M. Narayana, M. Lohitha