Computational Intelligence in Data Mining -Volume 3 (2025)

Related papers

Green Technology, Cloud Computing and Data Centers: the Need for Integrated Energy Efficiency Framework and Effective Metric

Nader Nada

View PDFchevron_right

Precise fingerprint enrolment through projection incorporated subspace based on Principal Component Analysis (PCA)

Dr. Md. Rajibul Islam

2007

View PDFchevron_right

Journal of Computer Science IJCSIS May 2016 Part II

It is our great pleasure to present the May 2016 issue PART 2 (Volume 14 Number 5 Part 2) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in the field, promoting insight and understanding of the state of the art, and trends in computer science and technology. It especially provides a platform for high-caliber academics, practitioners and PhD/Doctoral graduates to publish completed work and latest research outcomes. According to Google Scholar, up to now papers published in IJCSIS have been cited over 6389 times and the number is quickly increasing. This statistics shows that IJCSIS has established the first step to be an international and prestigious journal in the field of Computer Science and Information Security. There have been many improvements to the processing of papers; we have also witnessed a significant growth in interest through a higher number of submissions as well as through the breadth and quality of those submissions. IJCSIS is indexed in major academic/scientific databases and important repositories, such as: Google Scholar, Thomson Reuters, ArXiv, CiteSeerX, Cornell’s University Library, Ei Compendex, ISI Scopus, DBLP, DOAJ, ProQuest, ResearchGate, Academia.edu and EBSCO among others. On behalf of IJCSIS community and the sponsors, we congratulate the authors and thank the reviewers for their outstanding efforts to review and recommend high quality papers for publication. In particular, we would like to thank the international academia and researchers for continued support by citing papers published in IJCSIS. Without their sustained and unselfish commitments, IJCSIS would not have achieved its current premier status. “We support researchers to succeed by providing high visibility & impact value, prestige and excellence in research publication.” For further questions or other suggestions please do not hesitate to contact us at ijcsiseditor@gmail.com. A complete list of journals can be found at: http://sites.google.com/site/ijcsis/ IJCSIS Vol. 14, No. 5, May 2016 Edition ISSN 1947-5500 © IJCSIS, USA.

View PDFchevron_right

Cloud Computing and Security

VK VK

APPS, 1999

View PDFchevron_right

Journal of Computer Science and Information Security June 2011

Kifayat Ullah Khan, Mst Selvi, Abd Jemai, Dewi Agushinta R., Amjad Ali, Adekunle Yinka, Journal of Computer Science IJCSIS

Journal of Computer Science and Information Security (IJCSIS ISSN 1947-5500) is an open access, international, peer-reviewed, scholarly journal with a focused aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of Computing and Information Security. The journal is published monthly, and articles are accepted for review on a continual basis. Papers that can provide both theoretical analysis, along with carefully designed computational experiments, are particularly welcome. IJCSIS editorial board consists of several internationally recognized experts and guest editors. Wide circulation is assured because libraries and individuals, worldwide, subscribe and reference to IJCSIS. The Journal has grown rapidly to its currently level of over 1,100 articles published and indexed; with distribution to librarians, universities, research centers, researchers in computing, and computer scientists. Other field coverage includes: security infrastructures, network security: Internet security, content protection, cryptography, steganography and formal methods in information security; multimedia systems, software, information systems, intelligent systems, web services, data mining, wireless communication, networking and technologies, innovation technology and management. https://sites.google.com/site/ijcsis/

View PDFchevron_right

A SET OF SCALAR FEATURES REPRESENTATION FOR 3D FACE RECOGNITION

Fatimah Khalid

T1 Artificial Intelligence …, 2007

View PDFchevron_right

An Ontology Based Meta-Search Engine for Effective Web Page Retrieval

P. Vijaya

In virtualized environments, accurate metering the power consumption of individual virtual machine (VM) is a challenging issue. Conventional VM power metering techniques rely on the assumption that the power consumption is linear to the utilization of hardware utilization. However, such a utilization-based technique can only provide coarse-grained power measurement with unbounded error. In this paper, we firstly formulize the relationship between the resource utilization and the accuracy of power metering. Then, we proposed a novel VM scheduling algorithm, which uses the information of performance monitoring counters (PMC) to compensate the recursive power consumption. Theoretical analysis indicates that the proposed algorithm can provide bounded error when metering per-VM power consumption. Massive experiments are conducted by using various benchmarks on different platforms, and the results shown the error of per-VM power metering can be limited below 5.2%. Nomenclature U j Utilization of components j vm i P Dynamic power consumption of VM i W i

View PDFchevron_right

Emerging Database Research in East Europe

Bernhard Thalheim

View PDFchevron_right

Tool Support for Competency Evaluation of Web-Ontologies

Noor Teo

2007

Ontology is a key component of the semantic web. The web ontologies facilitate users to espouse a common understanding of the structure of knowledge in an application domain, enabling sharing of knowledge meaningfully on the web. The increasing use of the semantic web has escalated the demand for ‘competent’ ontologies, i.e., ontologies that can effectively support their purpose of use. Hence, we regard competency as an important quality that must be assessed when evaluating ontologies being built or adapted. The competency evaluation is a semantic analysis performed by a user to ascertain if the existing ontological commitments are adequate to support the ontology’s needs and requirements. The detail analysis inevitably needs to inspect the concepts defined in the ontology and trace the relationships that exist between them. Evaluating ontologies in this manner is a challenging task because it is cumbersome to trace the intricate conceptual relationships from within the ontol...

View PDFchevron_right

Attacking the Web Cancer with the Automatic Understanding Approach

Waldemar W Koczkodaj, Krzysztof Kielan, Kalpdrum Passi, Ryszard Tadeusiewicz

Advances in Soft Computing, 2007

View PDFchevron_right

Computational Intelligence in Data Mining -Volume 3 (2025)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Pres. Lawanda Wiegand

Last Updated:

Views: 5821

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.