Данные - 004.6

Научные статьи

В разделе "Данные"
A GA-Tabu Based User Centric Approach for Discovering Optimal Qos Composition
Vivek Gaur, Praveen Dhyani, O. P. Rishi
Investigation of Participation and Quality of Online Interaction
Dip Nandi, Margaret Hamilton, James Harland, Sharfuddin Mahmood
Building an Ontology for the Metamodel ISO/IEC24744 using MDA Process
Mehdi Mohamed Hamri, Sidi Mohamed Benslimane
Web Pages Retrieval with Adaptive Neuro Fuzzy System based on Content and Structure
Mohammad Saber Iraji, Hakimeh Maghamnia, Marzieh Iraji
Measuring of Software Maintainability Using Adaptive Fuzzy Neural Network
Mohammad Zavvar, Farhad Ramezani
Rule Based Communication Protocol between Social Networks using Semantic Web Rule Language (SWRL)
Enesi F. Aminu, Olaide N. Oyelade, Ibrahim S. Shehu
Load Balancing in Cloud Computing: A State of the Art Survey
Mohammadreza Mesbahi, Amir Masoud Rahmani
Evaluation of Performance on Open MP Parallel Platform based on Problem Size
Yajnaseni Dash, Sanjay Kumar, V.K. Patle
An Analysis of Performance Testing in Distributed Software Applications
Muhammad Fraz Malik, M. N. A. Khan
Email Spam Detection Using Combination of Particle Swarm Optimization and Artificial Neural Network and Support Vector Machine
Mohammad Zavvar, Meysam Rezaei, Shole Garavand
Implementation of a Simple Document Repository System
Kazuaki Kajitori, Kunimasa Aoki
Survey on Adverse Effect of Sophisticated Integrated Development Environments on Beginning Programmers' Skillfulness
Alaba T. Owoseni, S. A. Akanji
Novel Framework for Automation Testing of Mobile Applications using Appium
Ashwaq A. Alotaibi, Rizwan J. Qureshi
Developing a New e-Exam Platform to Enhance the University Academic Examinations: the Case of Lebanese French University
Mazin S. Al-Hakeem, Mohammad Salim Abdulrahman
E-Mail Spam Detection Using Refined MLP with Feature Selection
Harjot Kaur, Er. Prince Verma
Sentiment Analysis of Twitter User Data on Punjab Legislative Assembly Election, 2017
Akhilesh Kumar Singh, Deepak Kumar Gupta, Raj Mohan Singh
About Big Data Measurement Methodologies and Indicators
Makrufa Sh. Hajirahimova, Aybeniz S. Aliyeva
Analyzing the Performance of SVM for Polarity Detection with Different Datasets
Munir Ahmad, Shabib Aftab
Interconnect network on chip topology in multi-core processors: a comparative study
Manju Khari, Raghvendra Kumar, Dac-Nhuong Le, Jyotir Moy Chatterjee
A programmable and managed software defined network
Priyesh Kumar, Rajnarayan Dutta, Rakesh Dagdi, Kavitha Sooda, Archana Naik
Validation of an adaptive risk-based access control model for the internet of things
Hany F. Atlam, Ahmed Alenezi, Raid Khalid Hussein, Gary B. Wills
Application of geo-location-based access control in an enterprise environment
Victor L. Yisa, Baba Meshach, Oluwafemi Osho, Anthony Sule
Chaotic Genetic-fuzzy encryption technique
Hamdy M. Mousa
Simulation analysis of OLSR and its variant with cooperative MPR selection on NS-2.35 in mobile ad-hoc networks
Shelja Sharma, Suresh Kumar
A state-of-the-art survey of coverless text information hiding
Shahbaz Ali
Mobility support and operation of information centric networking approach
Muktar Hussaini, Shahrudin A. Nor, Amran Ahmad, Inusa Sani Maijama’a, Adamu Isah, Abdullahi Aminu
MANETs: QoS and investigations on optimized link state routing protocol
Lakshman Naik.L, R.U.Khan, R.B.Mishra
An integrated perceptron kernel classifier for intrusion detection system
Ruby Sharma, Sandeep Chaurasia
A critical appraisal on password based authentication
Amanpreet A. Kaur, Khurram K. Mustafa
Inculcating global optimization in ZRP through newfangled firefly algorithm
Neha Sharma, Usha Batra, Sherin Zafar
Network intrusion detection system based PSO-SVM for cloud computing
Mahmoud M. Sakr, Medhat A. Tawfeeq, Ashraf B. El-Sisi
Open source intelligence testing using the OWASP version 4 framework at the information gathering stage (Case Study: X Company)
I Putu Agus Eka Pratama, Anak Agung Bagus Arya Wiradarma
An approach to develop a transactional calculus for semi-structured database system
Rita Ganguly, Anirban Sarkar
Privacy and security concerns in electronic commerce websites in Ghana: a survey study
Issah Baako, Sayibu Umar, Prosper Gidisu
Analysis of features using feature model in software product line: a case study
Hitesh Yadav, A. Charan Kumari
A bug tracking tool for efficient penetration testing
Kavita Pandey
Bruteporter: a hybrid approach
Balamurugan Mahalingam, Kannan S., Vairaprakash Gurusamy
Key term extraction using a sentence based weighted TF-IDF algorithm
T. Vetriselvi, N. P. Gopalan, G. Kumaresan
A comparative investigation into edge detection techniques based on computational intelligence
Naveen Singh Dagar, Pawan Kumar Dahiya
A mobile based intelligent question answering system for education domain
Karpagam K., Saradha A.