Biblio
“Mathematical Formulation for Programmers to Select Background and Foreground Colors in Designing Websites”, International Journal of Web Applications, vol. 10, no. 2, pp. 47-50, 2018.
, “MCWDF - Micro-chunk based Web Delivery Framework”, Progress in Computing Applications, vol. 7, no. 1, pp. 26-40, 2018.
, “Measuring Software Architecture Stability Evolution in Object-oriented Open Source Systems”, Journal of Information Technology Review, vol. 9, no. 2, pp. 35-48, 2018.
, “Mining of Social Networks from Classic Books and Visualization-”, Journal of Digital Information Management, vol. 16, no. 1, pp. 1-11, 2018.
, “Mining of Social Networks from Classic Books and Visualization”, Journal of Digital Information Management , vol. 16, no. 1, p. 12, 2018.
, “A Mixed Chaotic-cellular Automata Based Encryption Scheme for Compressed Jpeg Images”, Journal of Multimedia Processing and Technologies, vol. 9, no. 3, pp. 88-101, 2018.
, “Model Integration Approach from SysML to MATLAB/Simulink-”, Journal of Digital Information Management, vol. 16, no. 6, pp. 289-307, 2018.
, “Model Integration Approach from SysML to MATLAB/Simulink-”, Journal of Digital Information Management, vol. 16, no. 6, pp. 289-307, 2018.
, “Model of “International Megalesson” of Learning Programming in Schools of Russia and Kazakhstan”, Progress in Computing Applications, vol. 7, no. 1, pp. 1-9, 2018.
, “A MultiCriteria Spatial WEB Decision Support System for Hazardous Materials Road Transport”, Transactions on Machine Design, vol. 6, no. 1, pp. 1-20, 2018.
, “NDSOM: Self Organizing Maps Learning Approach to Extract Noisy Data”, Journal of Intelligent Computing, vol. 9, no. 1, pp. 24-32, 2018.
, “Network Intrusion Detection by using Particle Swarm Optimization and Neural Network”, Journal of Networking Technology, vol. 9, no. 1, pp. 22-30, 2018.
, “New approach for intrusion detection in Big Data as a service in the Cloud”, Journal of Digital Information Management, vol. 16, no. 6, pp. 258-271, 2018.
, “New approach for intrusion detection in Big Data as a service in the Cloud-”, Journal of Digital Information Management, vol. 16, no. 5, pp. 258-270, 2018.
, “New Ideas for Applying Ant Colony Optimization to the Protein Function”, Journal of Data Processing, vol. 8, no. 2, pp. 74-81, 2018.
, “A New Look at the TOR Anonymous Communication System-”, Journal of Digital Information Management, vol. 16, no. 5, pp. 223-229, 2018.
, “A New Look at the TOR Anonymous Communication System”, Journal of Digital Information Management, vol. 16, no. 5, pp. 223-229, 2018.
, “A Noise-Robust Image Encryption Algorithm Based on Hyper Chaotic Cellular Neural Network-”, Journal of Digital Information Management, vol. 15, no. 5, pp. 246-257, 2018.
, “A Noise-Robust Image Encryption Algorithm Based on Hyper Chaotic Cellular Neural Network”, Journal of Digital Information Management, vol. 16, no. 5, pp. 246-257, 2018.
, “Non-words Spell Corrector of Social Media Data in Message Filtering Systems”, Journal of Digital Information Management, vol. 16, no. 2, pp. 64-75, 2018.
, “ Non-words Spell Corrector of Social Media Data in Message Filtering Systems –”, Journal of Digital Information Management, vol. 16, no. 2, pp. 64-75, 2018.
, “A Novel Framework for Context-aware Outlier Detection in Big Data Streams-”, Journal of Digital Information Management, vol. 16, no. 5, pp. 213-222, 2018.
, “A Novel Framework for Context-aware Outlier Detection in Big Data Streams-”, Journal of Digital Information Management, vol. 16, no. 5, pp. 213-222, 2018.
, “A Novel Node Integrity Based Authentication Model For Dynamic Wireless Communication Networks”, Signals and Telecommunication Journal, vol. 7, no. 1, pp. 17-33, 2018.
, “One-layer Neural Network for Solving Least Absolute Deviation Problems with Box and Equality Constraints”, Journal of Electronic Systems, vol. 8, no. 2, pp. 57-71, 2018.
,