83 results on '"Abawajy, Jemal"'
Search Results
2. Cryptocurrency Sentiment Analysis on the Twitter Platform Using Support Vector Machine (SVM) Algorithm
3. Chili Ripeness Grading Simulation Using Machine Learning Approach
4. SNR: Network-aware Geo-Distributed Stream Analytics
5. Accuracy Analysis Transliteration Balinese Script-to-Latin Text Using Hexadecimal Labeling Method
6. BDSP in the cloud: Scheduling and Load Balancing utlizing SDN and CEP
7. Predicting Breast Cancer Risk Using Subset of Genes
8. Clustering analysis for malicious network traffic
9. Failure detection in virtual network environment
10. Economical and environmental operation of smart networked microgrids under uncertainties using NSGA-II
11. ECG rate control scheme in pervasive health care monitoring system
12. An alternative sensor Cloud architecture for vital signs monitoring
13. Adaptive Energy-Efficient QoS-Aware Scheduling Algorithm for TCP/IP Mobile Cloud
14. A Framework for Implementing Asynchronous Replication Scheme in Utility-Based Computing Environment
15. Layered workflow scheduling algorithm
16. Secure object tracking protocol for Networked RFID Systems
17. Workflow scheduling on distributed systems
18. An SLA Evaluator for Multimedia Content Adaptation Services
19. The Challenges of Cloud Technology Adoption in E-government
20. A fuzzy technique to control congestion in WSN
21. A new energy efficient cluster-head and backup selection scheme in WSN
22. Critical Analysis and Comparative Study of Security for Networked RFID Systems
23. Crime Toolkits: The Productisation of Cybercrime
24. Preserving Utility in Social Network Graph Anonymization
25. Profiling Phishing Email Based on Clustering Approach
26. Hybrid Cloud resource provisioning policy in the presence of resource failures
27. Using feature selection for intrusion detection system
28. Detecting and Mitigating HX-DoS Attacks against Cloud Web Services
29. Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments
30. Mutual Authentication Protocol for Networked RFID Systems
31. Phishing Email Feature Selection Approach
32. Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing
33. Establishing Trust in Hybrid Cloud Computing Environments
34. Efficient Resource Selection Algorithm for Enterprise Grid Systems
35. Multi-criteria Content Adaptation Service Selection Broker
36. A RFID architecture framework for global supply chain applications
37. Information Provenance for Open Distributed Collaborative System
38. An Approach to Filtering RFID Data Streams
39. Enhancing RFID Tag Resistance against Cloning Attack
40. A Layered Security Approach for Cloud Computing Infrastructure
41. Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling
42. Determining Service Trustworthiness in Intercloud Computing Environments
43. An Online Credential Management Service for InterGrid Computing
44. A classification for content adaptation system
45. Investigation of Stakeholders Commitment to Information Security Awareness Programs
46. An Authentication Framework for e-Health Systems
47. Secure Mobile Agent-based E-Negotiation for On-Line Trading
48. Taxonomy and Survey of Location Management Systems
49. Feedback Credibility Issues In Trust Management Systems
50. Sensor Node Activity Scheduling Approach
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.