To search, Click below search items.
All Published Papers Search Service
Title
Design and Implementation of Computer Worms Based on Monitoring Replication and Damage
Author
Yazed B. Al-Saawy, Sulaiman Al amro
Vol. 16 No. 11 pp. 55-65
Keywords
Computer worms behavior detection, replication damage..
Presentation of a new strategy for choosing optimal resources of processes by multi-parametric function and developmental algorithms in cloud computing networks
Sakineh mirzaei, Mojtaba Seyedzadegan
Vol. 16 No. 11 pp. 46-54
Cloud Computing network, process scheduler, Prioritizing, SA.
Analysis of Physical Image Acquisition Forensic Tools for Android Smartphones
Firdous Kausar, Tadani Nasser Alyahya
Vol. 16 No. 11 pp. 38-45
physical image physical acquisition Android forensic forensic tools
An Investigative Design Based Statistical Approach for Determining Bangla Sentence Validity
Md. Riazur Rahman, Md. Tarek Habib, Md. Sadekur Rahman, Shaon Bhatta Shuvo, Mohammad Shorif Uddin
Vol. 16 No. 11 pp. 30-37
sentence validity detection natural language processing n-gram smoothing backoff strategy language model..