Управление. Менеджмент - 005

Научные статьи

В разделе "Управление. Менеджмент"
Password Hardened Biometric: A Complete Solution of Online Security
Ajay Sharma, Deo Brat Ojha
Textual Manipulation for SQL Injection Attacks
Hussein AlNabulsi, Izzat Alsmadi, Mohammad Al-Jarrah
Enhanced Role Based Access Control Mechanism for Electronic Examination System
Adebukola Onashoga, Adebayo Abayomi-Alli, Timileyin Ogunseye
Security, Privacy and Trust Challenges in Cloud Computing and Solutions
Seyyed Yasser hashemi, Parisa Sheykhi Hesarlo
Detection Block Model for SQL Injection Attacks
Diksha G. Kumar, Madhumita Chatterjee
PNFEA: A Proposal Approach for Proactive Network Forensics Evidence Analysis to Resolve Cyber Crimes
Mohammad Rasmi, Ahmad Al-Qerem
Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes
Rabail S. Satti, Fakeeha Jafari
Comparative Analysis of Classification Algorithms on KDD'99 Data Set
Iknoor Singh Arora, Gurpriya Kaur Bhatia, Amrit Pal Singh
TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection
Prabhjot Singh Chahal, Surinder Singh Khurana
Architecture for Accessing Heterogeneous Databases
Mohd Kamir Yusof, Ahmad Faisal Amri Abidin, Mohd Nordin Abdul Rahman
A New Centrality Measure for Tracking Online Community in Social Network
Sanjiv Sharma, G.N. purohit
Association Rule Hiding by Positions Swapping of Support and Confidence
Padam Gulwani
Security Requirements Metrics for Pattern-Lock Applications on Mobile Devices
Irfan Afifullah, Bayu Hendradjaya
An Efficient Multi-keyword Symmetric Searchable Encryption Scheme for Secure Data Outsourcing
Vasudha Arora, S.S. Tyagi
Empirical Estimation of Hybrid Model: A Controlled Case Study
Sadaf Un Nisa, M. Rizwan Jameel Qureshi
An Effective Way of Evaluating Trust in Inter-cloud Computing
Kiran Mary Matthew, Abdul Quadir Md
A Method of Movie Business Prediction Using Back-propagation Neural Network
Debaditya Barman, Nirmalya Chowdhury
Self-organized Detection of Relationships in a Network
P.Lokesh Kumar Reddy, B.Rama Bhupal Reddy, S.Rama Krishna
Distributed Malware Detection Algorithm (DMDA)
Aiman A. Abu Samra, Hasan N. Qunoo, Alaa M. Al Salehi
Semantic Multi-granular Lock model for Object Oriented Distributed Systems
V.Geetha, N.Sreenath
Study of Parametric Performance Evaluation of Machine Learning and Statistical Classifiers
Yugal kumar, G. Sahoo
Social Network Clustering
Narges Azizifard
A Formal Description of Problem Frames
Souleymane KOUSSOUBE, Roger NOUSSI, Balira O. KONFE
Impact of Collaborative ALM on Software Project Management
Tahmoor Shoukat, Muhammad Nadeem Majeed
Multiple Ranks Weighting Score for Microscopic Image Retrieval System
P. Suresh, L. Malliga, M. Vijay
TSSR: A Proposed Tool for Secure Software Requirement Management
Mohammad Ubaidullah Bokhari, Shams Tabrez Siddiqui
Expert Finding System using Latent Effort Ranking in Academic Social Networks
Sobha K. Rani, KVSVN Raju, V. Valli Kumari
A Research on Visual Analysis of Badminton for Skill Learning
Tatsunori Hashimoto, Masashi Toda
Edge Detection System using Pulse Mode Neural Network for Image Enhancement
S.Jagadeesh Babu, P.Karunakaran, S.Venkatraman, I.Hameem Shanavas, T.Kapilachander
A Geodesic Active Contour Level Set Method for Image Segmentation
K.R.Ananth, S.Pannirselvam
A New Measure of the Calculation of Semantic Distance between Ontology Concepts
Abdeslem DENNAI, Sidi Mohammed BENSLIMANE
Management of Possible Roles for Distributed Software Projects Using Layer Architecture
Yumnam Subadani Devi, Laishram Prabhakar
Improved Bit Plane Splicing LSB Technique for Secret Data Hiding in Images Using Linear Congruent Method
Ibrahim M. Hussain, M. Kamran Khan, Mohammad Naseem, Aisha Ajmal, Osama M. Hussain
Utilization of Textural Features in Video Retrieval System by Hand-writing Sketch
Hiroki Kobayashi, Masashi Toda
A Pragmatic Approach for E-governance Evaluation Built over Two Streams (of Literature)
Marya Butt
Performance of Cost Assessment on Reusable Components for Software Development using Genetic Programming
T.Tejaswini, J. Sirisha Devi, N. Murali Krishna
Extension of K-Modes Algorithm for Generating Clusters Automatically
Anupama Chadha, Suresh Kumar
Usability and Security in User Interface Design: A Systematic Literature Review
Ugochi Oluwatosin Nwokedi, Beverly Amunga Onyimbo, Babak Bashari Rad
Vehicle Theft Alert and Location Identification Using GSM, GPS and Web Technologies
Garba Suleiman, Ibrahim S. Shehu, Olumide S. Adewale, Muhammad B. Abdullahi, Solomon A. Adepoju
Evaluation of Meta-Heuristic Algorithms for Stable Feature Selection
Maysam Toghraee, Hamid parvin, Farhad rad