Biblio

Export 113 results:
Filters: First Letter Of Last Name is K  [Clear All Filters]
2018
R. Kumar and Sharan, A., Hybrid Multi-Criteria Decision Making Approach for Product Ranking Using Customers Reviews, Journal of Data Processing, vol. 8, no. 1, pp. 1-17, 2018.
K. S Kumar, Sivashanmugam, C., and Venkataraman, A., Intention to use Mobile Wallet: Extension of TAM Model, Journal of Electronic Systems, vol. 8, no. 1, pp. 27-34, 2018.
T. Chaghrouchni, Kabbaj, I. Mohammed, and Bakkoury, Z., Machine Learning in Predicting the Appropriate Model of Software Process Models Deviation-, Journal of Digital Information Management, vol. 16, no. 6, pp. 308-323, 2018.
T. Chaghrouchni, Kabbaj, I. Mohammed, and Bakkoury, Z., Machine Learning in Predicting the Appropriate Model of Software Process Models Deviation, Journal of Digital Information Management, vol. 16, no. 6, pp. 308-323, 2018.
V. Duvvuri, Laggoni, S., and Karinga, S., Mathematical Formulation for Programmers to Select Background and Foreground Colors in Designing Websites, International Journal of Web Applications, vol. 10, no. 2, pp. 47-50, 2018.
D. Kassimi, Kazar, O., Boussaid, O., and Merizig, A., New approach for intrusion detection in Big Data as a service in the Cloud, Journal of Digital Information Management, vol. 16, no. 6, pp. 258-271, 2018.
D. Kassimi, Kazar, O., Boussaid, O., and Merizig, A., New approach for intrusion detection in Big Data as a service in the Cloud, Journal of Digital Information Management, vol. 16, no. 6, pp. 258-271, 2018.
D. Kassimi, Kazar, O., Boussaid, O., and Merizig, A., New approach for intrusion detection in Big Data as a service in the Cloud-, Journal of Digital Information Management, vol. 16, no. 5, pp. 258-270, 2018.
D. Kassimi, Kazar, O., Boussaid, O., and Merizig, A., New approach for intrusion detection in Big Data as a service in the Cloud-, Journal of Digital Information Management, vol. 16, no. 5, pp. 258-270, 2018.
I. Ahmad, ,, ,, Zohaib, M., ,, and Khan, M., A New Look at the TOR Anonymous Communication System-, Journal of Digital Information Management, vol. 16, no. 5, pp. 223-229, 2018.
I. Ahmad, Saddique, M., Pirzada, U., Zohaib, M., Ali, A., and Khan, M., A New Look at the TOR Anonymous Communication System, Journal of Digital Information Management, vol. 16, no. 5, pp. 223-229, 2018.
G. Hu, Yuenyong, S., Qu, J., ,, and Kou, W., A Noise-Robust Image Encryption Algorithm Based on Hyper Chaotic Cellular Neural Network-, Journal of Digital Information Management, vol. 15, no. 5, pp. 246-257, 2018.
G. Hu, Yuenyong, S., Qu, J., Rong, J., and Kou, W., A Noise-Robust Image Encryption Algorithm Based on Hyper Chaotic Cellular Neural Network, Journal of Digital Information Management, vol. 16, no. 5, pp. 246-257, 2018.
R. Kohar, Optimal Web Service Selection Model using Fuzzy Extended AHP and Weighted Sum Method-, Journal of Digital Information Management, vol. 16, no. 4, pp. 157-168, 2018.
R. Kohar, Optimal Web Service Selection Model using Fuzzy Extended AHP and Weighted Sum Method, Journal of Digital Information Management, vol. 16, no. 4, pp. 157-168, 2018.
2019
N. Mesbahi, Zoubeidi, M., Merizig, A., and Kazar, O., An Agent-Based Approach for Extracting Business Association Rules from Centralized Databases Systems-, Journal of Digital Information Management, vol. 17, no. 5, pp. 270-288, 2019.
S. Bourekkache, Kazar, O., and Aloui, A., Computer and Network Security: Ontological and Multi-agent System for Intrusion Detection-, Journal of Digital Information Management, vol. 17, no. 3, pp. 133-144, 2019.
S. Bourekkache, Kazar, O., and Aloui, A., Computer and Network Security: Ontological and Multi-agent System for Intrusion Detection, Journal of Digital Information Management, vol. 17, no. 3, pp. 133-144, 2019.
T. RAFA and KECHID, S., Introducing a Personal Semantics in the User Profile Modeling for a Personalized Information Retrieval, Journal of Digital Information Management, vol. 17, no. 2, pp. 61-75, 2019.
T. RAFA and KECHID, S., Introducing a Personal Semantics in the User Profile Modeling for a Personalized Information Retrieval-, Journal of Digital Information Management, vol. 17, no. 2, pp. 61-74, 2019.
N. Mohd Sharef, Husin, N. Azura, Kasmiran, K. Azhar, and Ninggal, M. Izuan, Temporal Trends Analysis for Dengue Outbreak and Network Threats Severity Prediction Accuracy Improvement-, Journal of Digital Information Management, vol. 17, no. 3, pp. 122-132, 2019.
N. Mohd Sharef, Husin, N. Azura, Kasmiran, K. Azhar, and Ninggal, M. Izuan, Temporal Trends Analysis for Dengue Outbreak and Network Threats Severity Prediction Accuracy Improvement-, Journal of Digital Information Management, vol. 17, no. 2, p. 132, 2019.
H. Belouaar, Kazar, O., and Kabachi, N., Web Service Selection Approach Based on Agent and Fuzzy Logic, Journal of Digital Information Management, vol. 19, no. 1, 2019.
H. Belouaar, Kazar, O., and Kabachi, N., Web Service Selection Approach Based on Agent and Fuzzy Logic, Journal of Digital Information Management, vol. 19, no. 1, 2019.
H. Belouaar, Kazar, O., and Kabachi, N., Web Service Selection Approach Based on Agent and Fuzzy Logic-, Journal of Digital Information Management, vol. 17, no. 2, pp. 1-12, 2019.

Pages

Collaborative Partner

Institute of Electronic and Information Technology (IEIT)

Collaborative Partner

Collaborative Partner