To search, Click below search items.
All Published Papers Search Service
Title
Modeling Security Policies with Recommendations
Author
Nada Essaouini, Anas Abou El Kalam, Abdellah Ait Ouahman
Vol. 11 No. 11 pp. 129-138
Keywords
Information systems security, security policies, access control models, Deontic logic
Comparison of MLP and RBF neural networks for Prediction of ECG Signals
Ali Sadr, Najmeh Mohsenifar, Raziyeh Sadat Okhovat
Vol. 11 No. 11 pp. 124-128
electrocardiogram, artificial neural network, predict, accuracy
A Comparison between Hybrid Population-based Approaches for solving Post-Enrolment Course Timetabling Problems
Ghaith M. Jaradat, Masri Ayob
Vol. 11 No. 11 pp. 116-123
Elitist-Ant System, Big Bang-Big Crunch, Scatter Search, post-enrolment course timetabling problem, elite pool, solution combination
Release go-Live day Preparation: A light Weighted Framework to Ensure Smooth Release
Kalyan Thatavarti
Vol. 11 No. 11 pp. 110-115
Framework