Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7

Научные статьи

В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Face Recognition in Multi Camera Network with Sh Feature
R.Sumathy
Ontology-Based Semantic Annotation of Arabic Language Text
Maha Al-Yahya, Mona Al-Shaman, Nehal Al-Otaiby, Wafa Al-Sultan, Asma Al-Zahrani, Mesheal Al-Dalbahie
An Efficient Approach of Power Consumption in Cloud using Scheduling of Resources
Tanvi Tripathi, Sunita Gond
A Novel Web Page Change Detection Approach using Sql Server
Abu Kausar, V. S. Dhaka, Sanjeev Kumar Singh
Cost Estimation of the Homogeneous Websites Using Hyper-links Analysis
Mohammed Abdullah Hassan Al-Hagery
Using Unified Theory of Acceptance and Use of Technology Model to Predict Students' Behavioral Intention to Adopt and Use E-Counseling in Ghana
Emmanuel Awuni Kolog, Erkki Sutinen, Marjatta Vanhalakka-Ruoho, Jarkko Suhonen, Ebenezer Anohah
A Gaussian Filter based SVM Approach for Vehicle Class Identification
Gargi, Sandeep Dahiya
Performance Analysis of Schedulers to Handle Multi Jobs in Hadoop Cluster
Guru Prasad M S, Nagesh H R, Swathi Prabhu
Using Components of Corpus Linguistics and Annotation Tools in Sign Language Teaching
Katarzyna Barczewska, Jakub Gałka, Dorota Szulc, Mariusz Mąsior, Rafał Samborski, Tomasz J. Wilczyński
Rule Based Communication Protocol between Social Networks using Semantic Web Rule Language (SWRL)
Enesi F. Aminu, Olaide N. Oyelade, Ibrahim S. Shehu
Fuzzy Latent Semantic Query Expansion Model for Enhancing Information Retrieval
Olufade F.W Onifade, Ayodeji O.J. Ibitoye
Acceptance of E-Learning among Undergraduates of Computing Degrees in Sri Lanka
Dushyanthi U. Vidanagama
E-Mail Spam Detection Using SVM and RBF
Reena Sharma, Gurjot Kaur
A Comparative Analysis of Cloud Simulators
Pericherla S Suryateja
Cloud Library Framework for Ethiopian Public Higher Learning Institutions
Tilahun Shiferaw, Patrick D. Cerna
A Novel Approach for Data Cleaning by Selecting the Optimal Data to Fill the Missing Values for Maintaining Reliable Data Warehouse
Raju Dara, Ch. Satyanarayana, A. Govardhan
Machine Learning Cross Layer Technique to Detect Sink Hole Attacks in MANET
G.Usha, K.Mahalakshmi
Email Spam Detection Using Combination of Particle Swarm Optimization and Artificial Neural Network and Support Vector Machine
Mohammad Zavvar, Meysam Rezaei, Shole Garavand
The Impact of Mobile Devices for Learning in Higher Education Institutions: Nigerian Universities Case Study
Shaibu A. Shonola, Mike S. Joy, Solomon S. Oyelere, Jarkko Suhonen
Random Pattern based sequential bit (RaP-SeB) Steganography with Cryptography for Video Embedding
Ravpreet Kaur, Manish Mahajan
Web Services Privacy Preserving Based on Negotiation and Certificate Authorities
A. Meligy, Emad Elabd, Sahar Kotb
A Supervised Approach for Automatic Web Documents Topic Extraction Using Well-Known Web Design Features
Kazem Taghandiki, Ahmad Zaeri, Amirreza Shirani
An Analytical Study of the Use of Social Networks for Collaborative Learning in Higher Education
Afnan A. Alkhathlan, Ahmad A. Al-Daraiseh
Study on Challenges, Opportunities and Predictions in Cloud Computing
Jitendra Singh
Two-Level Alloyed Branch Predictor based on Genetic Algorithm for Deep Pipelining Processors
Shivam Goyal, Jaskirat Singh
SXP: Simplified Extreme Programing Process Model
Faiza Anwer, Shabib Aftab
IScrum: An Improved Scrum Process Model
Sara Ashraf, Shabib Aftab
Interconnect network on chip topology in multi-core processors: a comparative study
Manju Khari, Raghvendra Kumar, Dac-Nhuong Le, Jyotir Moy Chatterjee
Secure video compression and integration technique for data transmission
A.D.Senthil Kumar, T.S.Anandhi, Ranganath Muthu
A programmable and managed software defined network
Priyesh Kumar, Rajnarayan Dutta, Rakesh Dagdi, Kavitha Sooda, Archana Naik
Energy consumption in mobile phones
Ambrin Javed, Muhammad Alyas Shahid, Muhammad Sharif, Mussarat Yasmin
Distributed denial of service detection using multi layered feed forward artificial neural network
Ismaila Idris, Obi Blessing Fabian, Shafi’i M. Abdulhamid, Morufu Olalere, Baba Meshach
Achieving confidentiality in electronic health records using cloud systems
Robert French-Baidoo, Dominic Asamoah, Stephen Opoku Oppong
An implementation of software routing for building a private cloud
Rawezh Ziad Kamla, Tara Yahiya, Nashwan B. Mustafa
Performance analysis of classification techniques by using multi Agent based intrusion detection system
Aumreesh Kumar Saxena, Sitesh Sinha, Piyush Shukla
Optimization of different queries using optimization algorithm (DE)
Sahil Saharan, J.S. Lather, R. Radhakrishnan
Impact of IPv4, IPv6 and dual stack interface over wireless networks
Varsha Jain, Damodar Tiwari, Shailendra Singh, Sanjeev Sharma
A novel approach to thwart security attacks on mobile pattern authentication systems
Bh Padma, GVS Raj Kumar
Ethical network surveillance using packet sniffing tools: a comparative study
Ibrahim Ali Ibrahim Diyeb, Anwar Saif, Nagi Ali Al-Shaibany
Assessing vulnerability of mobile messaging apps to man-in-the-middle (MitM) attack
Rishabh Dudheria