An EPQ Model of Deteriorating Items under Partial Trade Credit Financing and Demand Declining Market in Crisp and Fuzzy Environment Fulltext Access 10 Pages 2015
A Contemporary Solution to Ferret Out and Obviate the Fake Messages in Vehicular Ad Hoc Networks by not Percolating through Web Server Fulltext Access 10 Pages 2015
Comparative Study of Indexing Techniques for Data Dissemination in Wireless Environment Fulltext Access 10 Pages 2015
Securing Text & Image Password Using the Combinations of Persuasive Cued Click Points with Improved Advanced Encryption Standard Fulltext Access 10 Pages 2015
DWT-based Feature Extraction and Radon Transform Based Contrast Enhancement for Improved Iris Recognition Fulltext Access 10 Pages 2015
Passive Marker Based Optical System for Gait Kinematics for Lower Extremity Fulltext Access 10 Pages 2015
Frequent Item Set Mining Using INC_MINE in Massive Online Analysis Frame Work Fulltext Access 10 Pages 2015
Application of Fuzzy-Rough Oscillation on the Field of Data Mining (Special Attention to the Crime Against Women at Tripura) Fulltext Access 10 Pages 2015
Dynamic Recommendation System Using Web Usage Mining for E-commerce Users Fulltext Access 10 Pages 2015
E-commerce Website Ranking Using Semantic Web Mining and Neural Computing Fulltext Access 10 Pages 2015
Spyware Detection in Android Using Hybridization of Description Analysis, Permission Mapping and Interface Analysis Fulltext Access 10 Pages 2015
Revisiting Major Discoveries in Linguistic Geometry with Mosaic Reasoning Fulltext Access 10 Pages 2015
A VDM-based Approach for Specifying and Testing Requirements of Web-applications Fulltext Access 10 Pages 2015
The Interplay between Requirements Relationships Knowledge and Requirements Change towards Software Project Success: An Assessment Using Partial Least Square (PLS) Fulltext Access 10 Pages 2015
Cloud Data Security for Goal Driven Global Software Engineering Projects Fulltext Access 10 Pages 2015
Extension Innovation Design of Product Family Based on Kano Requirement Model Fulltext Access 10 Pages 2015
Synergy and Technology Gaps in Export Logistics Chains between a Chilean and a Spanish medium-sized Port Fulltext Access 10 Pages 2015
Integrating Ontologies and Fuzzy Logic to Represent User-Trustworthiness in Recommender Systems Fulltext Access 10 Pages 2015
Condorcet Method with Weakly Rational Decision Makers: A Case Study in the Formula 1 Constructors’ Championship Fulltext Access 10 Pages 2015
Combining How Net and Extension Strategy Generation Method to Improve Customer Values Fulltext Access 10 Pages 2015
Business Continuity Management (BCM) Applied to Transpetro's National Operational Control Center - CNCO Fulltext Access 10 Pages 2015
A Performance Measure to Support Decision-Making in Agricultural Research Centers in Brazil Fulltext Access 10 Pages 2015
A Multi-objective Programming Approach to Network DEA with an Application to the Assessment of the Academic Research Activity Fulltext Access 10 Pages 2015
Using a Dominance-based Rough Set Approach for Analysing Business Indicators Fulltext Access 10 Pages 2015
A-TOPSIS – An Approach Based on TOPSIS for Ranking Evolutionary Algorithms Fulltext Access 10 Pages 2015
Biometric Based Unique ID Generation and One to One Verification for Security Documents Fulltext Access 10 Pages 2015
Multiple Criteria Data Envelopment Analysis – An Application to UEFA EURO 2012 Fulltext Access 10 Pages 2015
Assessment of Efficiency and Sustainability in a Chemical Industry Using Goal Programming and AHP Fulltext Access 10 Pages 2015
ICT Support Assessment in Primary School Teaching and Learning through AHP Fulltext Access 10 Pages 2015
ANP Applied to the Evaluation of Performance Indicators of Reverse Logistics in Footwear Industry Fulltext Access 10 Pages 2015
Mapping of the Scientific Production on the ITIL Application Published in the National and International Literature Fulltext Access 10 Pages 2015
Identifying Problem Solving Strategies for Learning Styles in Engineering Students Subjected to Intelligence Test and EEG Monitoring Fulltext Access 10 Pages 2015
A Look-Ahead-Based Heuristic for Packing Spheres into a Bin: The Knapsack Case Fulltext Access 10 Pages 2015
Proposed Framework for Implementing Data Mining Techniques to Enhance Decisions in Agriculture Sector Applied Case on Food Security Information Center Ministry of Agriculture, Egypt Fulltext Access 10 Pages 2015
Designing Educational Blogs Effect on the Student's Knowledge Acquisition in the Secondary Stage: Case Study of KSA Schools Fulltext Access 10 Pages 2015
Development of a Multi-Vector Information Security Rating Scale for Smart Devices as a Means for Raising Public InfoSec Awareness Fulltext Access 10 Pages 2015
Determinants of Social Networks Usage in Collaborative Learning: Evidence from Egypt Fulltext Access 10 Pages 2015
ECG Signal Transmissions Performance over Wearable Wireless Sensor Networks Fulltext Access 10 Pages 2015
Proposed Random Unified Chaotic Map as PRBG for Voice Encryption in Wireless Communication Fulltext Access 10 Pages 2015
Security Management: Real versus Perceived Risk of Commercial Exploitation of Social Media Personal Data Fulltext Access 10 Pages 2015
An Optimization Methodology for Container Handling Using Genetic Algorithm Fulltext Access 10 Pages 2015
Multi-Sensory Approach through the Use of ICT for the School Inclusion of a Child with Down Syndrome Fulltext Access 10 Pages 2015
Location-free Minimum Coverage Determination in a Heterogeneous Wireless Sensor Network Fulltext Access 10 Pages 2015
A Novel Multi-Threshold Energy (MTE) Technique for Wireless Sensor Networks Fulltext Access 10 Pages 2015
Capability of Control Chart Patterns Classifiers on Various Noise Levels Fulltext Access 10 Pages 2015
Locally Centralized SOCP-based Localization Technique for Wireless Sensor Network Fulltext Access 10 Pages 2015
À Load-balancing and Self-adaptation Clustering for Lifetime Prolonging in Large Scale Wireless Sensor Networks Fulltext Access 10 Pages 2015
Fast £1-norm Nearest Neighbor Search Using A Simple Variant of Randomized Partition Tree Fulltext Access 10 Pages 2015
Improving the Performance of a Proxy Cache Using Tree Augmented Naive Bayes Classifier Fulltext Access 10 Pages 2015
Controlled Expansion of Neighborhood in Trust Based Recommender Systems Fulltext Access 10 Pages 2015
Learning from Distributed Data Sources Using Random Vector Functional-Link Networks Fulltext Access 10 Pages 2015
Evaluation of Self-Organized Approach for Predicting Compressor Faults in a City Bus Fleet Fulltext Access 10 Pages 2015
Dynamic Phase and Group Detection in Pedestrian Crowd Data Using Multiplex Visibility Graphs Fulltext Access 10 Pages 2015
Robust Discovery of Temporal Structure in Multi-neuron Recordings Using Hopfield Networks Fulltext Access 10 Pages 2015
Extracting Clinical Relations in Electronic Health Records Using Enriched Parse Trees Fulltext Access 10 Pages 2015
An Investigation of Parallel Road Map Inference from Big GPS Traces Data Fulltext Access 10 Pages 2015
Big Data Analytics in the Cloud: Spark on Hadoop vs MPI/OpenMP on Beowulf Fulltext Access 10 Pages 2015
Shared-Repository based Approach for Storing and Discovering web Services Fulltext Access 10 Pages 2015
Discriminating Variable Star Candidates in Large Image Databases from the HiTS Survey Using NMF Fulltext Access 10 Pages 2015
An Exploratory Study to Determine the Suitability of Applying Information Systems Using (SWOT) Analysis, at Administrative Affairs Department in Power Plant Maintenance Centre Fulltext Access 10 Pages 2015
An Assistive Object Recognition System for Enhancing Seniors Quality of Life Fulltext Access 10 Pages 2015
A Framework for Classification and Visualization of Elephant Flows in SDN-Based Networks Fulltext Access 10 Pages 2015