Thank You for Your Support

Dear Authors and Readers,
Thank you for contributing to our journey by submitting and supporting our articles. Since 2022, we have ceased operations and are no longer active.
You can access all previously published articles in our Archive.

Volume 02-2013

Issue 01,02, 03, 04

Image Encryption Using Lagrange-Least Squares Interpolation

  • Authors :- Mohammed A. Shreef and Haider K. Hoomod
  • Keywords :- Image Encryption, Lagrange, Least Squares.
  • Published Online :- 19 September 2013
View Full PDF

Data Mining Approach to Detect Heart Dieses

  • Authors :- Vikas Chaurasia and Saurabh Pal
  • Keywords :- Bagging algorithm, Data Mining, Heart disease Diagnosis, J48 Decision Tree, Naïve Bayes.
  • Published Online :- 07 November 2013
View Full PDF

Smart Grid Ping – A Customized Ping Tool for a Heterogeneous and Hybrid Smart Grid Communication Network

  • Authors :- Do Nguyet Quang, Ong Hang See and Ong Xing Jui
  • Keywords :- Network performance, ping, smart grid, testing tool.
  • Published Online :- 23 November 2013
View Full PDF

Data Missing Solution Using Rough Set Theory and Swarm Intelligence

  • Authors :- Ahmed Tariq Sadiq, Mehdi Gzar Duaimi and Samir Adil Shaker
  • Keywords :- Bees’ Algorithm, Incomplete Databases, Null Values Problem, Rough Set.
  • Published Online :- 24 June 2013
View Full PDF

Outlier Detection in Stream Data by Machine Learning and Feature Selection Methods

  • Authors :- Hossein Moradi Koupaie, Suhaimi Ibrahim and Javad Hosseinkhani
  • Keywords :- Outlier Detection, Stream Data, Framework, Support Vector Machine.
  • Published Online :- 24 June 2013
View Full PDF

Outlier Detection in Stream Data by Clustering Method

  • Authors :- Hossein Moradi Koupaie, Suhaimi Ibrahim and Javad Hosseinkhani
  • Keywords :- Outlier Detection, Stream Data, Clustering Method, Efficient Algorithm.
  • Published Online :- 24 June 2013
View Full PDF

Hash Function of Finalist SHA-3: Analysis Study

  • Authors :- Imad Fakhri Al-shaikhli, Mohammad A. Alahmad and Khanssaa Munthir
  • Keywords :- Complexity, Performance, Security
  • Published Online :- 19 April 2013
View Full PDF

Criminal Communities Mining on the Web

  • Authors :- Javad Hosseinkhani, Suriayati Chuprat, Hamed Taherdoost, Morteza Harati Cool and Sadegh Emami Korani
  • Keywords :- Crime Web Mining, Concurrent Crawler, Terrorist Network, Social Network, Forensics Analysis.
  • Published Online :- 19 April 2013
View Full PDF

Hybrid Intelligent Techniques for Text Categorization

  • Authors :- Ahmed T. Sadiq and Sura Mahmood Abdullah
  • Keywords :- Rough Set Theory; Text Categorization; Text Mining.
  • Published Online :- 19 April 2013
View Full PDF

Hierarchical Structural Driven Model for Integrative Information Management Architecture

  • Authors :- Mohd Izzuddin Mohd Tamrin, Tengku Mohd Tengku Sembok and Mira Kartiwi
  • Keywords :- Intermediary processes, semi-automated case base reasoning, XML/XPath driven support models.
  • Published Online :- 04 April 2013
View Full PDF

Evaluation of Usability Problems of Labor Portal in Saudi Arabia

  • Authors :- Haifa Fahad AL-Zuabi and Imad Fakhri AL-Shaikhli
  • Keywords :- Evaluation, Usability, Labor Portal Quality, Experts’ Evaluation
  • Published Online :- 04 April 2013
View Full PDF

Retinal Identification Based on Density Clustering and Fuzzy Logic and Connecting This information to Electronic Health Record

  • Authors :- Farnaz Farshchian, Ebrahim Parcham and Shahram Tofighi
  • Keywords :- Fuzzy Logic, Density Classification, Electronic Medical File, Adaptive Filter
  • Published Online :- 04 April 2013
View Full PDF

  • Authors :-
  • Keywords :-
  • Published Online :-
View Full PDF

  • Authors :-
  • Keywords :-
  • Published Online :-
View Full PDF

  • Authors :-
  • Keywords :-
  • Published Online :-
View Full PDF