Issue | Title | |
Vol 11, No 1 (2016) | Network Intrusion Detection System Using PCA by Lp-Norm Maximization Based on Conjugate Gradient | Abstract |
Zyad Elkhadir, Khalid Chougdali, Mohamed Benattou | ||
Vol 10, No 9 (2015) | Network Security: Android Intrusion Attack on an Arduino Network IDS | Abstract |
Youssef Senhaji, H. Medromi, S. Tallal | ||
Vol 8, No 1 (2013) | Network Trustworthy Assessment Based on Advanced DyTrust Model | Abstract |
Minsheng Tan, Qiong Chen, Huan Zhou, Weixing Xie | ||
Vol 9, No 2 (2014) | Neurofuzzy and Genetic Network Programming Based Intrusion Detection System | Abstract |
A. J. Deepa, V. Kavitha | ||
Vol 11, No 12 (2016) | New Algorithms for Data Mining on Grid Computing | Abstract |
Khadidja Elkobra Belbachir, Hafida Belbachir | ||
Vol 10, No 12 (2015) | New Approach for Service Discovery and Prediction Based on Intentional Perspective and Recommendation | Abstract |
Sara Alaoui, Younes El Bouzekri El idrissi, Rachida Ajhoun, Fatana El Elmendili, Chaymae Benfaress | ||
Vol 10, No 12 (2015) | New Approach to Flicker Removal in Underwater Images | Abstract |
Anjik Sukmaaji, Eko Mulyanto Yuniarno, Mochamad Hariadi, I. Ketut E. Purnama | ||
Vol 8, No 12 (2013) | New Automatic Clustering Method Based on the Dissemination of Binary Trees Applied to Video Segmentation | Abstract |
A. Chergui, W. Sabbar, A. Bekkhoucha | ||
Vol 9, No 6 (2014) | New Computing Paradigm: Agent Orientated Engineering and Programming | Abstract |
Salaheddine Juma Juneidi | ||
Vol 8, No 11 (2013) | New Discovery of P2P Botnets Attack Pattern within Host-and-Network Atmosphere | Abstract |
Raihana Syahirah Abdullah, M. A. Faizal, Zul Azri Muhamad Noh | ||
Vol 11, No 9 (2016) | New Efficient Scheme Based on Reduction of the Dimension in the Multiple Impulse Method to Find the Minimum Distance of Linear Codes | Abstract |
Said Nouh, Issam Abderrahman Joundan, Bouchaib Aylaj, Mostafa Belkasmi, Abdelwahed Namir | ||
Vol 8, No 7 (2013) | New Heuristic for Reducing MPR in OLSR | Abstract |
Adil Benabbou, Abdelali Boushaba, Azddine Zahi, Rachid Benabbou, Mohammed Oumsis | ||
Vol 10, No 9 (2015) | New Maturity Evaluation Model for Open Source Software Selection | Abstract |
Youssef Ait Houaich, Mustapha Belaissaoui | ||
Vol 10, No 9 (2015) | New Method of Extraction and Tumor Detection Based on a Histogram Study and Support Vector Machine | Abstract |
Sara Sandabad, Yassine Sayd Tahri, Achraf Benba, Ahmed Hammouch | ||
Vol 11, No 10 (2016) | New Searching Technique of Hybrid Exact String Matching Algorithm | Abstract |
Atheer Akram Abdulrazzaq, Nur’Aini Abdul Rashid, Muhannad A. Abu-Hashem, Zurinahni Zainol | ||
Vol 10, No 7 (2015) | New Technique for Extraction Moving Object Based on Active Contours for Intelligent Visual Surveillance Applications | Abstract |
Belal Alshaqaqi, Meriem Boumehed | ||
Vol 9, No 3 (2014) | New Technique to Enhance Quality of Service Support for Real Time Applications in EDCA Protocol | Abstract |
Ahmed Abu-Khadrah, Zahriladha Zakaria, Mohd Azlishah Othman | ||
Vol 12, No 5 (2017) | Noise Radiation Evaluation from Refineries by Computer Simulation | Abstract |
M. Abdulkadir | ||
Vol 9, No 1 (2014) | Non Cooperative Power Control Game with New Pricing for Wireless Ad Hoc Networks | Abstract |
Sanjay Kumar Suman, Dhananjay Kumar, L. Bhagyalakshmi | ||
Vol 8, No 6 (2013) | Novel Methods for Non Uniform Patch Based Texture Synthesis Using Random Selection of Patches | Abstract |
S. Arivazhagan, R. S. Vinod Kumar | ||
Vol 8, No 8 (2013) | Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured Software | Abstract |
N. Sasirekha, M. Hemalatha | ||
Vol 10, No 10 (2015) | Novel Technique for Image Denoising Using Adaptive Haar Wavelet Transformation | Abstract |
B. V. D. S. Sekhar, P. V. G. D. Prasad Reddy, G. P. S. Varma | ||
Vol 11, No 7 (2016) | NPCs Multi Enemy Attack Formation Using Bee Colony Algorithm | Abstract |
Juniardi Nur Fadila, Eko Mulyanto Yuniarno, Supeno Mardi Susiki Nugroho, Fresy Nugroho | ||
Vol 10, No 7 (2015) | Offline Arabic Handwriting Recognition System Based on the Combination of Multiple Semi-Continuous HMMs | Abstract |
Ahlam Maqqor, Akram Halli, Khalid Satori, Hamid Tairi | ||
Vol 10, No 1 (2015) | OLSR Clustering Algorithm Based on Nodes Mobility | Abstract |
Mohamed Dyabi, Meryem Saadoune, Abdelmajid Hajami, Hakim Allali | ||
701 - 725 of 989 Items | << < 24 25 26 27 28 29 30 31 32 33 > >> |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize