Data Science Methodology for Cybersecurity Projects |
Farhad Foroughi and Peter Luksch, Institute of Computer Science University of Rostock, Germany |
Volume : 8 volume number : 4 pdf |
GRC-MS : A Genetic Rule Based Classifier Model for Analysis of Mass Spectra Data |
Sara Al-Osimi1 and Ghada Badr2, 1Shaqra University, KSA and 2The City of Scientific Research and Technological Applications, Egypt |
Volume : 8 volume number : 4 pdf |
Understanding People Title Properties to Improve Information Extraction Process |
Saleem Abuleil and Khalid Alsamara, Chicago State University, USA |
Volume : 8 volume number : 4 pdf |
http://airccj.org/CSCP/vol8/csit88403.pdf |
Yong-Jae Kim, Korea Polytechnic University, South Korea |
Volume : 8 volume number : 4 pdf |
Performance Analysis of Symmetric Key Ciphers in Linear and Grid Based Sensor Networks |
Kaushal Shah and Devesh C. Jinwala, S.V.National Institute of Technology, India |
Volume : 8 volume number : 4 pdf |
Perturbed Anonymization : Two Level Smart Privacy for LBS Mobile Users |
Ruchika Gupta, Udai Pratap Rao and Manish Kumar, S.V. National Institute of Technology, India |
Volume : 8 volume number : 4 pdf |
A Proposed HSV-Based Pseudo Coloring Scheme for Enhancing Medical Image |
Noura A. Semary, Menoufia University, Egypt |
Volume : 8 volume number : 4 pdf |
An Ontology Based Data Warehouse for the Grain Trade Domain |
Mhamed Itmi and Boulares Ouchenne, University of Rouen Normandy, France |
Volume : 8 volume number : 4 pdf |
Distributed System Approach to Experiment Regional Competitiveness |
Mhamed Itmi and Abdelkhalak El Hami, University of Rouen Normandy, France |
Volume : 8 volume number : 4 pdf |
Reliability of Mechanical System of Systems |
El Hami Abdelkhalakl and ITMI Mhamed, Normandy University, France |
Volume : 8 volume number : 4 pdf |