|
1 |
Comparison of Machine Learning Techniques for Cyberbullying Detection on YouTube Arabic Comments
Alsubait, Tahani;Alfageh, Danyah;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.1-5,
|
|
2 |
Opportunity Coefficient for Cluster-Head Selection in LEACH Protocol
Soh, Ben;AlZain, Mohammed;Lozano-Claros, Diego;Adhikari, Basanta;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.6-11,
|
|
3 |
Framework of Health Recommender System for COVID-19 Self-assessment and Treatments: A Case Study in Malaysia
Othman, Mahfudzah;Zain, Nurzaid Muhd;Paidi, Zulfikri;Pauzi, Faizul Amir;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.12-18,
|
|
4 |
A Review on the CPU Scheduling Algorithms: Comparative Study
Ali, Shahad M.;Alshahrani, Razan F.;Hadadi, Amjad H.;Alghamdi, Tahany A.;Almuhsin, Fatimah H.;El-Sharawy, Enas E.;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.19-26,
|
|
5 |
A Best Effort Classification Model For Sars-Cov-2 Carriers Using Random Forest
Mallick, Shrabani;Verma, Ashish Kumar;Kushwaha, Dharmender Singh;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.27-33,
|
|
6 |
Verifying Ontology Increments through Domain and Schema Independent Verbalization
Vidanage, Kaneeka;Noor, Noor Maizura Mohamad;Mohemad, Rosmayati;Bakar, Zuriana Aby;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.34-39,
|
|
7 |
Improved Feature Selection Techniques for Image Retrieval based on Metaheuristic Optimization
Johari, Punit Kumar;Gupta, Rajendra Kumar;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.40-48,
|
|
8 |
Results Of Mathematical Modeling Of Organizational And Technological Solutions Of Effective Use Of Available Resource Of Modern Roofs
Arutiunian, Iryna;Mishuk, Katerina;Dankevych, Natalia;Yukhymenko, Artem;Anin, Victor;Poltavets, Maryna;Sharapova, Tetiana;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.49-54,
|
|
9 |
User Interface Design & Evaluation of Mobile Applications
Samrgandi, Najwa;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.55-63,
|
|
10 |
Internal Model Control for Unstable Overactuated Systems with Time Delays
Mahmoud, Ines;Saidi, Imen;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.64-69,
|
|
11 |
Impact of COVID-19 Pandemic on Graduates Seeking Jobs
El-Boghdadi, Hatem M.;Noor, Fazal;Mahmoud, Mostafa;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.70-76,
|
|
12 |
Distributed System Cryptocurrency and Data Transfer
Alotaibi, Leena;Alnfiai, Mrim;Alhakami, Wajdi;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.77-83,
|
|
13 |
UML Modeling to TM Modeling and Back
Al-Fedaghi, Sabah;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.84-96,
|
|
14 |
An Extended Work Architecture for Online Threat Prediction in Tweeter Dataset
Sheoran, Savita Kumari;Yadav, Partibha;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.97-106,
|
|
15 |
Security Threats and Attacks in Internet of Things (IOTs)
Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Sami, Gofran;Alhakami, Wajdi;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.107-118,
|
|
16 |
Protection of a Multicast Connection Request in an Elastic Optical Network Using Shared Protection
BODJRE, Aka Hugues Felix;ADEPO, Joel;COULIBALY, Adama;BABRI, Michel;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.119-124,
|
|
17 |
Web Hypermedia Resources Reuse and Integration for On-Demand M-Learning
Berri, Jawad;Benlamri, Rachid;Atif, Yacine;Khallouki, Hajar;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.125-136,
|
|
18 |
EXECUTION TIME AND POWER CONSUMPTION OPTIMIZATION in FOG COMPUTING ENVIRONMENT
Alghamdi, Anwar;Alzahrani, Ahmed;Thayananthan, Vijey;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.137-142,
|
|
19 |
A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB
Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.143-151,
|
|
20 |
Device to Device Communications Architectures and Cross-Layer Evaluation Frameworks
Aldabbagh, Ghadah;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.152-161,
|
|
21 |
Honeypots Tools Study and Analysis
Al-Jameel, Sultan;Alanazi, Adwan Alownie;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.162-173,
|
|
22 |
Social Media Security and Attacks
Almalki, Sarah;Alghamdi, Reham;Sami, Gofran;Alhakami, Wajdi;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.174-183,
|
|
23 |
SECURITY THREATS AND ATTACKS IN CLOUD
Mohammed, Asma;Al khathami, Jamilah;Alhakami, Wajdi;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.184-191,
|
|
24 |
Modeling Exponential Growth in Population using Logistic, Gompertz and ARIMA Model: An Application on New Cases of COVID-19 in Pakistan
Omar, Zara;Tareen, Ahsan;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.192-200,
|
|
25 |
Assessing the Green Total Factor Productivity of Water Use in Mainland China
Ning, Meng;Wu, Zheru;Zhou, Zhitian;Yang, Duogui;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.201-206,
|
|
26 |
A Hybrid Routing Protocol Based on Bio-Inspired Methods in a Mobile Ad Hoc Network
Alattas, Khalid A;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.207-213,
|
|
27 |
Performance Evaluation of Elderly Home Automation Control (EHAC) IoT System
Phua, Karsten Cheng Kai;Goh, Wei Wei;Marjani, Mohsen;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.214-219,
|
|
28 |
Comparing the Performance of 17 Machine Learning Models in Predicting Human Population Growth of Countries
Otoom, Mohammad Mahmood;
/
International Journal of Computer Science & Network Security
, v.21, no.1, pp.220-225,
|
|