Browse > Article List

논문
1 Comparison of Machine Learning Techniques for Cyberbullying Detection on YouTube Arabic Comments
Alsubait, Tahani;Alfageh, Danyah; / International Journal of Computer Science & Network Security , v.21, no.1, pp.1-5,
2 Opportunity Coefficient for Cluster-Head Selection in LEACH Protocol
Soh, Ben;AlZain, Mohammed;Lozano-Claros, Diego;Adhikari, Basanta; / International Journal of Computer Science & Network Security , v.21, no.1, pp.6-11,
3 Framework of Health Recommender System for COVID-19 Self-assessment and Treatments: A Case Study in Malaysia
Othman, Mahfudzah;Zain, Nurzaid Muhd;Paidi, Zulfikri;Pauzi, Faizul Amir; / International Journal of Computer Science & Network Security , v.21, no.1, pp.12-18,
4 A Review on the CPU Scheduling Algorithms: Comparative Study
Ali, Shahad M.;Alshahrani, Razan F.;Hadadi, Amjad H.;Alghamdi, Tahany A.;Almuhsin, Fatimah H.;El-Sharawy, Enas E.; / International Journal of Computer Science & Network Security , v.21, no.1, pp.19-26,
5 A Best Effort Classification Model For Sars-Cov-2 Carriers Using Random Forest
Mallick, Shrabani;Verma, Ashish Kumar;Kushwaha, Dharmender Singh; / International Journal of Computer Science & Network Security , v.21, no.1, pp.27-33,
6 Verifying Ontology Increments through Domain and Schema Independent Verbalization
Vidanage, Kaneeka;Noor, Noor Maizura Mohamad;Mohemad, Rosmayati;Bakar, Zuriana Aby; / International Journal of Computer Science & Network Security , v.21, no.1, pp.34-39,
7 Improved Feature Selection Techniques for Image Retrieval based on Metaheuristic Optimization
Johari, Punit Kumar;Gupta, Rajendra Kumar; / International Journal of Computer Science & Network Security , v.21, no.1, pp.40-48,
8 Results Of Mathematical Modeling Of Organizational And Technological Solutions Of Effective Use Of Available Resource Of Modern Roofs
Arutiunian, Iryna;Mishuk, Katerina;Dankevych, Natalia;Yukhymenko, Artem;Anin, Victor;Poltavets, Maryna;Sharapova, Tetiana; / International Journal of Computer Science & Network Security , v.21, no.1, pp.49-54,
9 User Interface Design & Evaluation of Mobile Applications
Samrgandi, Najwa; / International Journal of Computer Science & Network Security , v.21, no.1, pp.55-63,
10 Internal Model Control for Unstable Overactuated Systems with Time Delays
Mahmoud, Ines;Saidi, Imen; / International Journal of Computer Science & Network Security , v.21, no.1, pp.64-69,
11 Impact of COVID-19 Pandemic on Graduates Seeking Jobs
El-Boghdadi, Hatem M.;Noor, Fazal;Mahmoud, Mostafa; / International Journal of Computer Science & Network Security , v.21, no.1, pp.70-76,
12 Distributed System Cryptocurrency and Data Transfer
Alotaibi, Leena;Alnfiai, Mrim;Alhakami, Wajdi; / International Journal of Computer Science & Network Security , v.21, no.1, pp.77-83,
13 UML Modeling to TM Modeling and Back
Al-Fedaghi, Sabah; / International Journal of Computer Science & Network Security , v.21, no.1, pp.84-96,
14 An Extended Work Architecture for Online Threat Prediction in Tweeter Dataset
Sheoran, Savita Kumari;Yadav, Partibha; / International Journal of Computer Science & Network Security , v.21, no.1, pp.97-106,
15 Security Threats and Attacks in Internet of Things (IOTs)
Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Sami, Gofran;Alhakami, Wajdi; / International Journal of Computer Science & Network Security , v.21, no.1, pp.107-118,
16 Protection of a Multicast Connection Request in an Elastic Optical Network Using Shared Protection
BODJRE, Aka Hugues Felix;ADEPO, Joel;COULIBALY, Adama;BABRI, Michel; / International Journal of Computer Science & Network Security , v.21, no.1, pp.119-124,
17 Web Hypermedia Resources Reuse and Integration for On-Demand M-Learning
Berri, Jawad;Benlamri, Rachid;Atif, Yacine;Khallouki, Hajar; / International Journal of Computer Science & Network Security , v.21, no.1, pp.125-136,
18 EXECUTION TIME AND POWER CONSUMPTION OPTIMIZATION in FOG COMPUTING ENVIRONMENT
Alghamdi, Anwar;Alzahrani, Ahmed;Thayananthan, Vijey; / International Journal of Computer Science & Network Security , v.21, no.1, pp.137-142,
19 A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB
Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.; / International Journal of Computer Science & Network Security , v.21, no.1, pp.143-151,
20 Device to Device Communications Architectures and Cross-Layer Evaluation Frameworks
Aldabbagh, Ghadah; / International Journal of Computer Science & Network Security , v.21, no.1, pp.152-161,
21 Honeypots Tools Study and Analysis
Al-Jameel, Sultan;Alanazi, Adwan Alownie; / International Journal of Computer Science & Network Security , v.21, no.1, pp.162-173,
22 Social Media Security and Attacks
Almalki, Sarah;Alghamdi, Reham;Sami, Gofran;Alhakami, Wajdi; / International Journal of Computer Science & Network Security , v.21, no.1, pp.174-183,
23 SECURITY THREATS AND ATTACKS IN CLOUD
Mohammed, Asma;Al khathami, Jamilah;Alhakami, Wajdi; / International Journal of Computer Science & Network Security , v.21, no.1, pp.184-191,
24 Modeling Exponential Growth in Population using Logistic, Gompertz and ARIMA Model: An Application on New Cases of COVID-19 in Pakistan
Omar, Zara;Tareen, Ahsan; / International Journal of Computer Science & Network Security , v.21, no.1, pp.192-200,
25 Assessing the Green Total Factor Productivity of Water Use in Mainland China
Ning, Meng;Wu, Zheru;Zhou, Zhitian;Yang, Duogui; / International Journal of Computer Science & Network Security , v.21, no.1, pp.201-206,
26 A Hybrid Routing Protocol Based on Bio-Inspired Methods in a Mobile Ad Hoc Network
Alattas, Khalid A; / International Journal of Computer Science & Network Security , v.21, no.1, pp.207-213,
27 Performance Evaluation of Elderly Home Automation Control (EHAC) IoT System
Phua, Karsten Cheng Kai;Goh, Wei Wei;Marjani, Mohsen; / International Journal of Computer Science & Network Security , v.21, no.1, pp.214-219,
28 Comparing the Performance of 17 Machine Learning Models in Predicting Human Population Growth of Countries
Otoom, Mohammad Mahmood; / International Journal of Computer Science & Network Security , v.21, no.1, pp.220-225,