Forschungsartikel
Designing of Low Power Low Area Arithmetic and Logic Unit
Deep Web Mining Formulated With Information Administration Systems
Empirical Comparative Study to Some Supervised Approaches
Novel Approach to Generate Signature Preventing Network Attack as Unsupervised Detection
Review on Generating Private Recommendations Using Elgamal Homomorphic Encryption
Survey on Different Methods of Image Steganography
A Survey on Different Graphical Password Authentication Techniques
A Review on Re-ranking Techniques
Recommendation of Songs for Next Generation with Square Euclidean Distance
Ant Possibilistic Fuzzy Clustered Forecasting on High Dimensional Data
An Enhanced Distributed Weighted Clustering Algorithm for Intra and Inter Cluster Routing in MANET
Application of First Order Linear Homogeneous Difference Equations to the Real Life and Its Oscillatory Behavior
An Intelligent and Automated Drip Irrigation System Using Sensors Network Control System
Review on Threshold Based Secret Sharing Schemes
A Survey on Multimedia Protocols in Wireless Network
A Survey on Network Coding Techniques to Solve MTB Problem in Wireless Networks
Mining of Web Logs Using Preprocessing and Clustering
Study on Ascendancy of Social Media Analytics
Secure and Performance Analysis of Data Transaction in Clustered Wireless Sensor Networks
Performance of Hybrid Genetic Algorithm on Digital Circuit Area Minimization
Kernel Based Process Level Authentication Framework for Secure Computing and High Level System Assurance
Big Data in Educational Data Mining and Learning Analytics
Unsupervised Distance-Based Outlier Detection Using Nearest Neighbours Algorithm on Distributed Approach: Survey
Combined Effects of Radiation and Hall Current on MHD Flow Past an Exponentially Accelerated Vertical Plate in the Presence of Rotation
A Survey on Fusion Techniques for Multimodal Biometric Identification
Tongue Operated Smart Environment for Paralytic People
Formation of Smart Sentiment Analysis Technique for Big Data
Improvising DoS Attack Detection Using Multivariate Correlation Analysis
Statistical Analysis of Disk Drives Performance with Application Directed Prefetching Approach
Performance Analysis of an Efficient Low Power NOC Router System Using Gray Encoding Techniques
Extract Transform and Load Strategy for Unstructured Data into Data Warehouse Using Map Reduce Paradigm and Big Data Analytics
Data Mining& Health Care: Techniques of Application
A Survey on Hybrid Cloud with De-Duplication
Preventing Attacks on Social Networks Using Sanitization Technique
Cancerous Cell Detection Using Histopathological Image Analysis
The Connection between Data Mining and Segmentation in Marketing Area
A Review: Image Interpolation Techniques for Image Scaling
Mobility Aware QoS Framework for Mobile Cloud Computing
Secure CoAP Using Enhanced DTLS for Internet of Things
Cipher Text Policy Based Attribute Encryption
Readiness of Helper Monitoring For Home Alone Disabled and Elderly Persons
L1 Minimization Based Par Reduction in MU-MIMO-OFDM
Hop By Hop Authentication for Source Intermediate Node Privacy Protection in Wireless Sensor Network
Sensitive Data Storage and Access Using Patient’s Mobile Device
A Survey on a Personalized Mobile Search Engine
Automated Scaling of Cluster Using Deployment Diagrams in Platform-As-AService
Energy-Efficient Topology Control with Selective Diversity in Cooperative Wireless Ad Hoc Networks: An Overview
User Authentication Using Graphical Password Scheme: A More Secure Approach Using Mobile Interface
HL7 and SOA Based Distributed Electronic Patient Record Architecture Using Open EMR
An Extremely Versatile Key Pre-Distribution Plan for Remote Sensor Systems
Review on Low Power Design Using Comparator for VLSI Design Circuit
Autonomous System(AS) for Mesh Network by Using Packet Transmission & Failure Detection
Efficient Hashing Algorithm for Midsquare
A Victimization Optical Back Propagation Technique in Content Based Mostly Spam Filtering
Comparison of Optimistic and Pessimistic MTTF Bounds of NIASN with ABN
Implementation of Estimation to Power and Area for VLSI Circuit
Security Enhancements of AODV Protocol: A Comparative Study
Security Aware Adhoc on Demand Distance Vector Routing Protocol in Vehicular Adhoc Network
A Review on Comparable Entity Mining
A Survey on Approaches to Build Efficient Query Services in Cloud
A Comparative Study on Web Life Cycle Activities & Composite Web Services
A Decision Support System for Predicting Student Performance
Advanced Multimedia Answer Generation by Scraping Information through Web
Survey on Security Issues in Cognitive Radio Network
Mining Frequent Itemset Using Parallel Computing Apriori Algorithm
Mistreatment Multiclass in Handwritten Character Recognition SVM Classification with Hybrid Feature Extraction
A Study and Survey of Artificial Immune Systems
Healthcare Systems: Wireless Sensor Networks Using Recent Advances on Energy Efficient Cluster Based Routing Protocols
Improved Security and Privacy In: A Media Cloud Computing Middleware for Content Management Using Cloud Material Protection Algorithm
Security Enhancement Using Two-Server Model
Highly Secure Public Data Verification Architecture Using Secure Public Verifier Auditor in Cloud Enviroment
Decision Making Using Sentiment Analysis from Twitter
A Survey On: Privacy Ensuring Optimization Protocol for Cross-Domain Firewalls to Improve the Network Performance
A Survey on Filtering Unwanted Messages from Online Social Network Users Wall Using Text Classification
Web Based Dynamic Table Creation and Implementing Query Forms for End User
Voice and Gesture Based Wheelchair Using AVR and Android
Evaluating the Impact of Routing and Queuing Techniques on the QoS of VoIP Over IP/MPLS Networks
Usage of Mobile Devices as Learning Tools among Higher Education and Undergraduate Student in Amman University College
Model for Strengthening Accuracy through Detection of Anomalous Firewall Policy Rules
Language of Building Processes Modeling AIMO (Abstract Information Model of Object), As A Basis of Configurator
Design of a Secured Electronic Voting System Using Multimodal Biometrics
Efficient Mining of Criminal Networks from Unstructured Textual Documents
Mehr sehen