>
Fa   |   Ar   |   En
   the isc international journal of information security   
سال:2019 - دوره:11 - شماره:3


  tick  a fair power allocation for non-orthogonal multiple access in the power domain - صفحه:123-130

  tick  a sudy on information privacy issue on social networks - صفحه:19-27

  tick  access and mobility policy control at the network edge - صفحه:105-111

  tick  algebraic matching of vulnerabilities in a low-level code - صفحه:1-7

  tick  an optimal utilization of cloud resources using adaptive back propagation neural network and multi-level priority queue scheduling - صفحه:145-151

  tick  aspect oriented uml to ecore model transformation - صفحه:97-103

  tick  cloud and iot based smart car parking system by using mamdani fuzzy inference system (mfis) - صفحه:153-160

  tick  cognitive strategic model applied to a port system - صفحه:73-78

  tick  considering uncertainty in modeling historical knowledge - صفحه:59-65

  tick  critical success factors for data virtualization: a literature review - صفحه:131-137

  tick  enhancing learning from imbalanced classes via data preprocessing: a data-driven application in metabolomics data mining - صفحه:79-89

  tick  evaluating multipath tcp resilience against link failures - صفحه:113-122

  tick  evaluation of planet factors of smart city through multi-layer fuzzy logic (mfl) - صفحه:51-58

  tick  face recognition based rank reduction svd approach - صفحه:39-50

  tick  hand gestures classification with multi-core dtw - صفحه:91-96

  tick  iot protocols based fog/cloud over high traffic - صفحه:173-180

  tick  medical image compression based on region of interest - صفحه:29-34

  tick  proposed st-slotted-cs-aloha protocol for time saving and collision avoidance - صفحه:67-72

  tick  role and application of rfid technology in internet of things: communication, authentication, risk, and security concerns - صفحه:9-17

  tick  the role of packet tracer in learning wireless networks and managing iot devices - صفحه:35-38

  tick  towards measuring the project management process during large scale software system implementation phase - صفحه:161-172

  tick  using machine learning arima to predict the price of cryptocurrencies - صفحه:139-144

  tick  virtualized network management laboratory for educational purposes - صفحه:181-186
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved