Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
FileSyncer: Design, Implementation, and Performance Evaluation
Oluwafemi Osho, Anthony Ugbede Faruna
Hashing Key Based Analysis of Polynomial Encryption Standard
Pic Sonia, Surender Kumar Grewal
Novel Hybrid Model: Integrating Scrum and XP
Zaigham Mushtaq, M. Rizwan Jameel Qureshi
Advanced Applications of Neural Networks and Artificial Intelligence: A Review
Koushal Kumar, Gour Sundar Mitra Thakur
An Efficient Multi-keyword Symmetric Searchable Encryption Scheme for Secure Data Outsourcing
Vasudha Arora, S.S. Tyagi
On the Quick Construction of the Edge-Balance Index Sets of a Classes of Nested Network Graph
Hongjuan Tian, Yuge Zheng
Database Semantic Interoperability based on Information Flow Theory and Formal Concept Analysis
Guanghui Yang, Junkang Feng
Adaptive Guidance based on Context Profile for Software Process Modeling
Hamid Khemissa, Mohamed Ahmed-Nacer, Mourad Oussalah
Trends, Issues and Challenges Concerning Spam Mails
Jitendra Nath Shrivastava, Maringanti Hima Bindu
Genomic Analysis and Classification of Exon and Intron Sequences Using DNA Numerical Mapping Techniques
Mohammed Abo-Zahhad, Sabah M. Ahmed, Shimaa A. Abd-Elrahman
Offline Handwritten Devanagari Script Recognition
Ved Prakash Agnihotri
Using Negative Binomial Regression Analysis to Predict Software Faults: A Study of Apache Ant
Liguo Yu
Modification of RC4 Algorithm by using Two State Tables and Initial State Factorial
Sura M. Searan, Ali M. Sagheer
A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes
Nisar Ahmed, Hafiz Muhammad Shahzad Asif, Gulshan Saleem
Delay Tolerant Networks: An Analysis of Routing Protocols with ONE Simulator
Richa Thakur, K.L. Bansal
Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations
Wenjun Fan, Kevin Lwakatare, Rong Rong
A Novel Digital Signature Algorithm based on Biometric Hash
Shivangi Saxena, Darpan Anand
Pre-Processing of University Webserver Log Files for Intrusion Detection
Bukola A. Onyekwelu, B. K. Alese, A. O. Adetunmbi
Identity Verification Mechanism for Detecting Fake Profiles in Online Social Networks
Ali M. Meligy, Hani M. Ibrahim, Mohamed F. Torky
Named Data Networking: Investigate of New Infrastructure for Future of Internet
Hadis Rezaei, Asad Vakili
Limitations of Passively Mapping Logical Network Topologies
Ayodeji J. Akande, Colin Fidge, Ernest Foo
Application of Attribute Based Access Control Model for Industrial Control Systems
Erkan Yalcinkaya, Antonio Maffei, Mauro Onori
Design of an Android Application for Secure Chatting
Ammar H. Ali, Ali M. Sagheer
An Effective Way of Evaluating Trust in Inter-cloud Computing
Kiran Mary Matthew, Abdul Quadir Md
Pre-quarantine Approach for Defense against Propagation of Malicious Objects in Networks
ChukwuNonso H. Nwokoye, Godwin C. Ozoegwu, Virginia E. Ejiofor
Novel Cloud Architecture to Decrease Problems Related to Big Data
Entesar Althagafy, M. Rizwan Jameel Qureshi
Integrating Non-Functional Properties in Model Driven Development: A Stepwise Refinement View
Maryam Nooraei Abade, Zeinab Rajabi
Coupling Complexity Metric: A Cognitive Approach
A. Aloysius, L. Arockiam
Proposal of Implicit Coordination Model for Performance Enhancement Using Sprint Zero
M. Rizwan Jameel Qureshi, Ahmed Barnawi, Aiesha Ahmad
Random Handwritten CAPTCHA: Web Security with a Difference
Mukta Rao, Nipur Singh
Optical Many Casting Using QoS Depend Layer Aware Mechanism
R.C. Arun Chander, P.Karunakaran, S.Venkatraman, I.Hameem Shanavas
Determining Contribution of Features in Clustering Multidimensional Data Using Neural Network
Suneetha Chittineni, Raveendra Babu Bhogapathi
Digital Image Enhancement with Fuzzy Interface System
Amanpreet Singh, Preet Inder Singh, Prabhpreet Kaur
Minimizing Power Consumption by Personal Computers: A Technical Survey
P. K. Gupta, G. Singh
Determining the Optimum Time Quantum Value in Round Robin Process Scheduling Method
Shahram Saeidi, Hakimeh Alemi Baktash
Design and Development of a Simple Low-cost Touchscreen to Control Home Automation System
M. Muntasir Rahman, Md. Aktaruzzaman, Mst. Ashrafunnahar Hena
Using Web Services Standards for Dealing with Complexities of Multiple Incompatible Applications
Quist-Aphetsi Kester, Ghartey Nana Gyankumah, Ajibade Ibrahim Kayode
A Proposed Virtualization Technique to Enhance IT Services
Nashaat el-Khameesy, Hossam Abdel Rahman Mohamed
Improvement in Quality of Software Architecture via Enhanced-Pattern Driven Architecture (EPDA)
Muhammad Fahad Khan, Kanwal Yousaf, Anam Mustaqeem, Muazaam Maqsood
Validated CMS: Towards New Generation of Web Content Management Systems on Web 2.0
Zakaria Itahriouan, Anouar Abtoy, Kamal Eddine El Kadiri, Noura Aknin