To search, Click below search items.
All Published Papers Search Service
Title
Cloud Based Security Center: To Protect Networking Attack by Forensic Scrutiny
Author
Sankara Mahalingam M
Vol. 16 No. 2 pp. 83-87
Keywords
Cloud Computing, Collaborative Network Security System, Computer forensics, Anti-Phishing, Hadoop File System, Eucalyptus.
An Anatomy of Data Visualization
Abhishek Kaushik, Sudhanshu Naithani
Vol. 16 No. 2 pp. 77-82
Information Visualization, Scientific Visualization, Decision Making, Graph, Chart, Xmdv tool.
A Comprehensive Study of Text Mining Approach
Vol. 16 No. 2 pp. 69-76
Text Mining, Data Mining, Natural Language Processing, Machine Learning, Visualization, Text Analysis.
Efficient Window Approach of FIR Filter Design (MSK2)
Qeethara Al-Shayea, Muzhir Al-Ani
Vol. 16 No. 2 pp. 63-68
Adaptive Filter Design, Kaiser Window, Tukey Window, FIR and MSK?2.