عنوان البحث | ملخص البحث | Research Abstract |
Local Detectors and Descriptors for Object Class Recognition | | |
Evaluating the performance of symmetric encryption algorithms | | Internet and networks applications are growing very fast, so the needs to protect such applications are increased |
Performance evaluation of various symmetric encryption algorithms | | With rise in the use of internet in various fields like banking, military and government sector, the security and privacy of the data has been the main concern |
Enhanced data security model for cloud computing | | Cloud Computing becomes the next generation architecture of IT Enterprise |
Enhanced particle swarm optimization for task scheduling in cloud computing environments | | The most important requirement in cloud computing environment is the task scheduling which plays the key role of efficiency of the whole cloud computing facilities |
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. | | As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against the data thieves’ attacks |
Studying the effects of most common encryption algorithms | Wireless networks play critical roles in present work, home, and public places, so the needs of protecting of such networks are increased | |
E-learning systems in virtual environment
| | E-learning is one of the emerging needs of the information age. Therefore a lot of potential is seen in distance learning development. |
Performance evaluation of symmetric encryption algorithms
| | Internet and networks applications are growing very fast, so the needs to protect such applications are increased. |
A hybrid approach for efficient anomaly detection using metaheuristic methods | | Network intrusion detection based on anomaly detection techniques has a significant role in protecting networks and systems against harmful activities |
Comparative study between Differential Evolution and Particle Swarm Optimization algorithms in training of feed-forward neural network for stock price prediction | | This paper presents a comparison between two stochastic, population based and real-valued algorithms. |
Neural networks training based on differential evolution al-gorithm compared with other architectures for weather forecasting34 | | Accurate weather predictions are important for planning our dayto-day activities. In recent years, a large literature has evolved on the use of artificial neural networks (ANNs) in many forecasting applications |
Artificial immune clonal selection classification algorithms for classifying malware and benign processes using API call sequences | | Machine learning is an important field of artificial intelligence in which models are generated by extracting rules and functions from large datasets |
Modern encryption techniques for cloud computing | | Cloud computing has to become the next-generation architecture of IT Enterprise. Clouds are massively complex systems |
Data security model for cloud computing | | From the perspective of data security, which has always been an important aspect of quality of service, cloud computing focuses a new challenging security threats |
Randomness testing of modern encryption techniques in cloud environment | | Cloud computing becomes the next generation architecture of IT Enterprise. Clouds are massively complex systems |
Performance evaluation of symmetric encryption algorithms on power consumption for wireless devices | | the popularity of wireless networks increases, so does the need to protect them. Encryption algorithms play a main role in information security systems |
Performance of encryption techniques for real time video streaming | | Recently, multimedia security is becoming more important with the continuous increase of digital communications on the Internet |
Image encryption based on new one-dimensional chaotic map | | |
Selecting and extracting effective features for automated diagnosis of Alzheimer's disease | | In this paper, a Computer Aided Diagnosis (CAD) system is proposed to provide a comprehensive analytic method for extracting the most significant features of Alzheimer’s disease (AD). |
Hand gesture recognition using fourier descriptors | | Accurate, real-time hand gesture recognition is a challenging and crucial task due to the need of more natural human-computer interaction methods |