Vol 13, No.1, January 2016 ( Vol 13, No.1, January 2016 ) (16)
Designing a Fuzzy-Logic Based Trust and Reputation Model for Secure Resource Allocation in Cloud Com
Designing a Fuzzy-Logic Based Trust and Reputation
Efficient Transmission of PKI Certificates using ECC and
An Intelligent CRF Based Feature Selection for Effective Intrusion Detection<
Using Ontologies for Extracting Differences in the Dynamic Domain: Application
wPFP-PCA: Weighted Parallel Fixed Point PCA Face Recognition
A General Characterization of Representing and Determining Fuzzy Spatial Relations<
Empirical Evaluation of Syntactic and Semantic
Defects Introduced by Refactoring Support
Adaptive Automata-based Model for Iterated n-Player’s
Encryption Quality Measurement of a Proposed Cryptosystem Algorithm for the Colored
More...
Data Mining Perspective: Prognosis of Life Style on Hypertension
Design and Implementation of a Synchronous and Asynchronous-Based Data Replication Technique in Clou
Design and Implementation of a Synchronous and Asynchronous-Based
A DEA-Based Approach for Information Technology Risk Assessment through
- Diploma Courses
- Business and Enterprise
- Digital Literacy & IT
- Health Literacy
- Business Literacy
-
Sonstur aut pereis dolibus Starting from Jun. 14 2016
-
The impact of nursing Starting from Jun. 10 2016
-
English for beginner Starting from Jun. 10 2016
-
How to control the risk Starting from Jun. 10 2016