Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Anti-virus (9)
- Anti-virus design (9)
- Anti-virus development (9)
- Anti-virus software (9)
- Computer Anti-Virus (9)
-
- Computer security (9)
- Computer virus (9)
- Generic scanning (9)
- Signature scanning (9)
- Virus detection (9)
- Virus scanning (9)
- Computer vulnerability (8)
- Heuristic scanning (8)
- Integrity checking (8)
- Behavior monitoring (7)
- Inoculation (7)
- Resident scanning (6)
- Activity monitoring (5)
- Emulation (5)
- Software Innovation (5)
- Virus database (4)
- Innovation and Economic Growth (3)
- International Development (3)
- Open Orbiter Project (3)
- Server scanning (3)
- Student spacecraft (3)
- Enterprise and Investment Development (2)
- Fast scanning (2)
- ICT for Development and Poverty Alleviation (2)
- MIS (2)
Articles 31 - 41 of 41
Full-Text Articles in Entire DC Network
Conceptual Modelling And The Quality Of Ontologies: Endurantism Vs. Perdurantism, Mutaz M. Al-Debei, Mohammad Mourhaf Al Asswad, Sergio De Cesare, Mark Lycett
Conceptual Modelling And The Quality Of Ontologies: Endurantism Vs. Perdurantism, Mutaz M. Al-Debei, Mohammad Mourhaf Al Asswad, Sergio De Cesare, Mark Lycett
Dr. Mutaz M. Al-Debei
Ontologies are key enablers for sharing precise and machine-understandable semantics among different applications and parties. Yet, for ontologies to meet these expectations, their quality must be of a good standard. The quality of an ontology is strongly based on the design method employed. This paper addresses the design problems related to the modelling of ontologies, with specific concentration on the issues related to the quality of the conceptualisations produced. The paper aims to demonstrate the impact of the modelling paradigm adopted on the quality of ontological models and, consequently, the potential impact that such a decision can have in relation …
Implementations Of Ict Innovations: A Comparative Analysis In Terms Of Challenges Between Developed And Developing Countries, Mutaz Al-Debei, Enas Al-Lozi
Implementations Of Ict Innovations: A Comparative Analysis In Terms Of Challenges Between Developed And Developing Countries, Mutaz Al-Debei, Enas Al-Lozi
Dr. Mutaz M. Al-Debei
The main aim of this paper is to achieve a depth of understanding of the various similarities and differences in terms of challenges between developed and developing countries and in regards to the implementation of ICT innovations. Indeed, advances in Information and Communication Technologies (ICTs) have brought many innovations to the field of Information Systems (IS). Despite agreements on their importance to the success of organizations, the implementation processes of such innovations are multifaceted and require proper addressing of a wide-spread issues and challenges. In this study, we address this matter by first; synthesizing a comprehensive body of recent and …
Data Mining Text Book, Abbas Madraky
A Survey Of The State Of The Art In Particle Swarm Optimization, Mahdiyeh Eslami, Hussain Shareef, Mohammad Khajehzadeh, Azah Mohamed
A Survey Of The State Of The Art In Particle Swarm Optimization, Mahdiyeh Eslami, Hussain Shareef, Mohammad Khajehzadeh, Azah Mohamed
Dr. Mahdiyeh Eslami (مهدیه اسلامی)
No abstract provided.
Comparing Qos Of Dsdv And Aodv Routing Protocols In Vehicular Network, Aref Hassanpour, Hooman Hoodeh, Amirhossein Zarrinnegar, Arsalan Emami, Rafidah Md Noor
Comparing Qos Of Dsdv And Aodv Routing Protocols In Vehicular Network, Aref Hassanpour, Hooman Hoodeh, Amirhossein Zarrinnegar, Arsalan Emami, Rafidah Md Noor
Hooman Hoodeh
With the advance of Vehicular ad-hoc network, routing protocol has become one of the most important issues in transmitting data among Vehicles. The two routing protocol are DSDV and AODV which DSDV is known as a novel approach in proactive system; however, AODV has good performance in reactive system. In this paper, we compare the efficiency between DSDV & AODV in terms of packet-loss, end-to-end delay and throughput based on given scenarios. The comparison has implemented in various speeds for acquiring result with higher performance. The speeds consist of 5, 20 and 40km/s. then we analyze the explicit results according …
Operating Software, Donovan Torgerson, Miyuru Arangala, Michael Hlas, David Bullock, Dayln Limesand, Cameron Kerbaugh, Daniel Schuler, Mitchell Fossen, Edwin Carlson, Atif Mohammad, Josh Berk, Jeremy Straub
Operating Software, Donovan Torgerson, Miyuru Arangala, Michael Hlas, David Bullock, Dayln Limesand, Cameron Kerbaugh, Daniel Schuler, Mitchell Fossen, Edwin Carlson, Atif Mohammad, Josh Berk, Jeremy Straub
Jeremy Straub
No abstract provided.
Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk
Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk
Jeremy Straub
No abstract provided.
Payload Software, Christoffer Korvald, Jeremy Straub, Atif Mohammad, Josh Berk
Payload Software, Christoffer Korvald, Jeremy Straub, Atif Mohammad, Josh Berk
Jeremy Straub
No abstract provided.
Adaptive Kriging Controller Design For Hypersonic Flight Vehicle Via Back-Stepping, Bin Xu
Adaptive Kriging Controller Design For Hypersonic Flight Vehicle Via Back-Stepping, Bin Xu
Bin Xu
No abstract provided.
Direct Neural Discrete Control Of Hypersonic Flight Vehicle, Bin Xu
Direct Neural Discrete Control Of Hypersonic Flight Vehicle, Bin Xu
Bin Xu
No abstract provided.
New Steganography Algorithm To Conceal A Large Amount Of Secret Message Using Hybrid Adaptive Neural Networks With Modified Adaptive Genetic Algorithm, Nameer N. El-Emam, Rasheed A. Al-Zubidy
New Steganography Algorithm To Conceal A Large Amount Of Secret Message Using Hybrid Adaptive Neural Networks With Modified Adaptive Genetic Algorithm, Nameer N. El-Emam, Rasheed A. Al-Zubidy
Philadelphia University, Jordan
In this paper, we propose a new steganography algorithm using non-uniform adaptive image segmentation (NUAIS) with an intelligent computing technique to conceal efficiently a large amount of confidential messages (Smsg) into color images. Whereas, the number of secret bits to be replaced is non uniform from byte to another byte; it based on byte characteristics, which are extracted by using 16 byte levels (BL) with variance distribution of the Neighboring Eight Bytes (NEB) around the current byte. Four security layers are introduced to increase resistance against statistical and visual attacks. These layers are designed to make an excellent imperceptible concealing …