Dorma Trading, Est. Publishing Manager
期刊
会议
图书
作者:Prof. Dr. Adel Darwish , Assoc. Prof. Dr. Ayman E. Khedr , Dr. Iman Asaad Badr ...
来源:[J].International Journal of Computer Science and Software Engineering (IJCSSE), 2015, Vol.4 (1)
摘要:Although there are large numbers of software quality models are applied, there are still serious problems in the production of the software industry which leads to an increase in cost and time required producing software. Therefore, it is necessary to have a new approach to measu...
作者:Mykola Beshley , Mykhailo Klymash , Bohdan Strykhalyuk ...
来源:[J].International Journal of Computer Science and Software Engineering (IJCSSE), 2015, Vol.4 (1)
摘要:SOA quality management subsystem on the basis of load balancing method using fuzzy sets with real traffic flows on an experimental testbed has been proposed. The model of the network that is under investigation has been built. This model allows to verify functioning of prognostic...
作者:Engr. Sadaqat Ur Rehman , Engr. Muhammad Junaid , Engr. Obaid Ur Rehman
来源:[J].International Journal of Computer Science and Software Engineering (IJCSSE), 2015, Vol.4 (1)
摘要:This paper explains Magnetic Levitation system of a train which comprises of guidance track made with magnets. The main objective is to design a proper controller that can suspend and propelled the train on a guidance track made with magnets. To perform the desired task state spa...
作者:Rasha Elhassan , Mahmoud Ahmed
来源:[J].International Journal of Computer Science and Software Engineering (IJCSSE), 2015, Vol.4 (1)
摘要:A millions of the documents are available free and online. These documents must be first organized systematically for its proper utilization to make a decision from it. There are a lot of applications that help in organizing the documents. Text classification is deal with how the...
作者:ARSALAN IQBAL , SAMEER LIAQAT ALI KHAN
来源:[J].International Journal of Computer Networks and Communications Security (IJCNCS), 2015, Vol.3 (1)
摘要:Present day Internet and communication systems heavily rely on the basis of IP Routing protocols. These different routing protocols are mainly categorized as static, dynamic and hybrid routing protocols. The selection of these routing protocols depends upon the network requiremen...
作者:ABDELBAKI Issam , CHARKAOUI Salma , LABRIJI Amine ...
来源:[J].International Journal of Computer Networks and Communications Security (IJCNCS), 2015, Vol.3 (1)
摘要:The information research systems tends mainly to model the user according to profile and then integrate it into the chain of access to information, to better meet their specific needs. Given the large number of user profiles available on the internet, the safeguarding becomes pro...
作者:Aliakbar Tajari Siahmarzkooh , Saied Tabarsa , Ziba Hosseini Nasab ...
来源:[J].International Journal of Computer Networks and Communications Security (IJCNCS), 2015, Vol.3 (1)
摘要:IDSs which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the compute...
作者:Guillaume Fond , MD , Alexandru Gamanb ...
来源:[J].International Journal of Computer Networks and Communications Security (IJCNCS), 2015, Vol.3 (1)
摘要:Two studies have shown that increasing the consultation of the word suicide in the Google search engine was associated with a subsequent increase in the prevalence of suicide attempts. The purpose of this paper was to analyse the trends in Google searches on suicide, depression a...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×