No matching posts.
  • ⟨⟨
  • ⟩⟩

publications  

  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue III): 38-42 (March 2019)1 Federal Agency on Technical Regulation and Metrology: Block ciphers (2015). http://www.tc26.ru/en/standard/draft/ENG_GOST_R_bsh.pdf. 2 Information technology. Cryptographic data security. Block ciphers operation modes. URL: http://www.tc26.ru/standard/ gost/GOST_R_ 3413-2015.pdf. 3 E. Biham, A. Shamir. Differential cryptanalysis of DES-like cryptosystems // Journal Cryptology. 1991. V. 4. P. 3–72. 4 R. AlTawy, A. Youssef, Meet in the Middle Attack on Reduced Round Kuznyechik, https://eprint.iacr.org/2015/ 096.pdf, pp. 9-12. 5 A. Biryukov, L. Perrin, A. Udovenko, Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version), https://eprint.iacr.org/ 2016/071.pdf, p. 3. 6 V. Dolmatov, GOST R 34.12-2015: Block Cipher "Kuznyechik. http://www.protocols.ru/WP/wp-content/ uploads/2016 /03/ rfc7801.pdf, pp. 3-4. 7 G.U. Juraev, A.A. Ikramov, A.R. Marakhimov, About differential cryptanalysis algorithm of block encryption Kuznyechik //International Journal of Advanced Research in Science, Engineering and Technology. Vol. 6, Issue 2, Feb 2019. –P. 8164-8169. http://www.ijarset.com/upload/2019/february/26-IJARSET-gjuraev.pdf..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IRJCS:: International Research Journal of Computer Science, Volume VI (Issue III): 38-46 (March 2019)1. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation computer systems, vol. 25, pp. 599-616, 2009. 2. P. Mell and T. Grance, "The NIST definition of cloud computing," 2011. 3. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., Ä view of cloud computing," Communications of the ACM, vol. 53, pp. 50-58, 2010. 4. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, et al., Äbove the clouds: A berkeley view of cloud computing," Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley2009. 5. I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared," in Grid Computing Environments Workshop, 2008. GCE'08, 2008, pp. 1-10. 6. B. Hayes, "Cloud computing," Communications of the ACM, vol. 51, pp. 9-11, 2008. 7. D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, et al., "The eucalyptus open-source cloud-computing system," in Cluster Computing and the Grid, 2009. CCGRID'09. 9th IEEE/ACM International Symposium on, 2009, pp. 124-131. 8. R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and R. Buyya, "CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," Software: Practice and experience, vol. 41, pp. 23-50, 2011. 9. L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, Ä break in the clouds: towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, pp. 50-55, 2008. 10. S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "Cloud computing—The business perspective," Decision support systems, vol. 51, pp. 176-189, 2011. 11. A. D. Basha, I. N. Umar, and M. Abbas, "Mobile applications as cloud computing: implementation and challenge," International Journal of Information and Electronics Engineering, vol. 4, p. 36, 2014. 12. C. Shravanthi and H. Guruprasad, "Mobile cloud computing as future for mobile applications," International Journal of Research in Engineering and Technology, vol. 3, pp. 2319-2322, 2014. 13. N. Patil, N. Patil, A. Bagal, M. Desai, and A. Bhosale, "Development of Android Mobile Application for Cloud Video Streaming using Mobile Cloud Computing." 14. A. D. Basha, "Modeling E-Learning Readiness among Instructors in Iraqi Public Universities," Universiti Sains Malaysia, 2015. 15. K. Patil and S. Patil, Ä CASE STUDY ON MOBILE CLOUD COMPUTING." 16. M. A. Mahmod, A. B. M. Ali, A. R. B. Ahlan, A. Shah, and M. S. A. Seman, "E-learning in Iraqi universities: A review," in Computing, Engineering, and Design (ICCED), 2017 International Conference on, 2017, pp. 1-4. 17. A. D. Basha, S. H. Mnaathr, I. N. Umar, and R. Jamaludin, "Insight on Protection of Universities Networks Information Security: The Problems and the Solutions," 2013. 18. E. M. Morgado and R. Schmidt, "Increasing Moodle resources through cloud computing," in Information Systems and Technologies (CISTI), 2012 7th Iberian Conference on, 2012, pp. 1-4. 19. M. Wang, Y. Chen, and M. J. Khan, "Mobile cloud learning for higher education: A case study of Moodle in the cloud," The International Review of Research in Open and Distributed Learning, vol. 15, 2014. 20. V. Siládi and V. Mižúrová, "LMS Moodle on Computing Cloud," in 4th Interantional Scientific Conference in V4 Countries, Applied Natural Sciences, Trnava, 2013. 21. V. Kumar and D. Sharma, "Creating Collaborative and Convenient Learning Environment Using Cloud-Based Moodle LMS: An Instructor and Administrator Perspective," International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), vol. 11, pp. 35-50, 2016. 22. N. Sclater, "eLearning in the Cloud," International Journal of Virtual and Personal Learning Environments, vol. 1, pp. 10-19, 2012..
    5 years ago by @ijiris
    (1)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue II): 29-39 (February 2019)1. Katiyar, A., Singh, S. K. & Haritash, A. K. Effect of Odd Even Scheme To Combat Air Pollution in Nct of Delhi. Int. J. Adv. Res 5, 2320–5407 (2017). 2. Shekhar Singh, S. & SK, S. Environmental Concerns in National Capital Territory of Delhi, India. J. Climatol. Weather Forecast. 03, 3–7 (2015). 3. Tiwary, A. & Colls, J. Air Pollution: Measurement, modelling and mitigation. Atmospheric Environment (2010). doi:doi:10.4324/9780203476024.fmatt 4. Paliatsos, A. G., Kaldellis, J. K., Koronakis, P. S. & Garofalakis, J. E. Fifteen year air quality trends associated with the vehicle traffic in Athens, Greece. Fresenius Environ. Bull. 11, 1119–1126 (2002). 5. LI, X., LIU, C., LEUNG, D. & LAM, K. Recent progress in CFD modelling of wind field and pollutant transport in street canyons. Atmos. Environ. 40, 5640–5658 (2006). 6. Assael, M. J., Delaki, M. & Kakosimos, K. E. Applying the OSPM model to the calculation of PM10concentration levels in the historical centre of the city of Thessaloniki. Atmos. Environ. 42, 65–77 (2008). 7. Taseiko, O. V., Mikhailuta, S. V., Pitt, A., Lezhenin, A. A. & Zakharov, Y. V. Air pollution dispersion within urban street canyons. Atmos. Environ. 43, 245–252 (2009). 8. Aenab, A. M., Needs, C., Foundation, S. & Singh, S. K. Air Quality Assessment : A Statistical Approach to Stationary Air Monitoring Stations Air Quality Assessment : A Statistical Approach to Stationary Air Monitoring Stations. (2015). 9. Mapoma, H. W. T., Tenthani, C., Tsakama, M. & Kosamu, I. B. M. Air quality assessment of carbon monoxide, nitrogen dioxide and sulfur dioxide levels in Blantyre, Malawi: A statistical approach to a stationary environmental monitoring station. African J. Environ. Sci. Technol. 8, 330–343 (2014). 10. Meroney, R. N., Pavageau, M., Rafailidis, S. & Schatzmann, M. Study of line source characteristics for 2-D physical modelling of pollutant dispersion in street canyons. J. Wind Eng. Ind. Aerodyn. 62, 37–56 (1996). 11. Rafailidis, S. Influence of Building Areal Density and Roof Shape on the Wind Characteristics Above a Town. Boundary-Layer Meteorol. 85, 255–271 (1997). 12. Uehara, K., Murakami, S., Oikawa, S. & Wakamatsu, S. Wind tunnel experiments on how thermal stratification affects flow in and above urban street canyons. Atmos. Environ. (2000). doi:10.1016/S1352-2310(99)00410-0 13. Yassin, M. F., Kellnerová, R. & Jaňour, Z. Impact of street intersections on air quality in an urban environment. Atmos. Environ. 42, 4948–4963 (2008). 14. Chan, T. L., Dong, G., Leung, C. W., Cheung, C. S. & Hung, W. T. Validation of a two-dimensional pollutant dispersion model in an isolated street canyon. Atmos. Environ. 36, 861–872 (2002). 15. Kanakiya, R. S., Singh, S. K. & Mehta, P. M. Urban Canyon Modelling : A Need for the Design of Future Indian Cities. 4, 86–95 (2015). 16. Assimakopoulos, V. D., ApSimon, H. M. & Moussiopoulos, N. A numerical study of atmospheric pollutant dispersion in different two-dimensional street canyon configurations. Atmos. Environ. 37, 4037–4049 (2003). 17. Hassan, A. A. & Crowther, J. M. Modelling of fluid flow and pollutant dispersion in a street canyon. in Environmental Monitoring and Assessment (1998). doi:10.1023/A:1005928630000 18. Huang, H., Akutsu, Y., Arai, M. & Tamura, M. A two-dimensional air quality model in an urban street canyon: Evaluation and sensitivity analysis. Atmos. Environ. 34, 689–698 (2000). 19. Di Sabatino, S., Buccolieri, R., Pulvirenti, B. & Britter, R. Simulations of pollutant dispersion within idealised urban-type geometries with CFD and integral models. Atmos. Environ. 41, 8316–8329 (2007). 20. Sini, J. F., Anquetin, S. & Mestayer, P. G. Pollutant dispersion and thermal effects in urban street canyons. Atmos. Environ. 30, 2659–2677 (1996). 21. Ahmadi, G. & Li, A. Computer simulation of particle transport and deposition near a small isolated building. J. Wind Eng. Ind. Aerodyn. 84, 23–46 (2000). 22. Janour, Z., Jurcakova, K., Brych, K., Dittrt, F. & Dittrich, F. Potential risks at an industrial site: A wind tunnel study. Process Saf. Environ. Prot. 88, 185–190 (2010). 23. Kim, J. J. & Baik, J. J. A numerical study of the effects of ambient wind direction on flow and dispersion in urban street canyons using the RNG k-ε turbulence model. Atmos. Environ. 38, 3039–3048 (2004). 24. Gousseau, P., Blocken, B., Stathopoulos, T. & van Heijst, G. J. F. CFD simulation of near-field pollutant dispersion on a high-resolution grid: A case study by LES and RANS for a building group in downtown Montreal. Atmos. Environ. (2011). doi:10.1016/j.atmosenv.2010.09.065 25. Li, X. X., Liu, C. H. & Leung, D. Y. C. Large-eddy simulation of flow and pollutant dispersion in high-aspect-ratio urban street canyons with wall model. Boundary-Layer Meteorol. (2008). doi:10.1007/s10546-008-9313-y 26. Xie, Z. T. & Castro, I. P. Large-eddy simulation for flow and dispersion in urban streets. Atmos. Environ. (2009). doi:10.1016/j.atmosenv.2009.01.016 27. Barmpas, F., Bouris, D. & Moussiopoulos, N. 3D Numerical Simulation of the Transient Thermal Behavior of a Simplified Building Envelope Under External Flow. J. Sol. Energy Eng. (2009). doi:10.1115/1.3139137 28. Jiang, Y. & Chen, Q. Effect of fluctuating wind direction on cross natural ventilation in buildings from large eddy simulation. Build. Environ. (2002). doi:10.1016/S0360-1323(01)00036-1 29. Tzempelikos, A., Athienitis, A. K. & Karava, P. Simulation of facade and envelope design options for a new institutional building. Sol. Energy (2007). doi:10.1016/j.solener.2007.02.006 30. Jiang, Y., Alexander, D., Jenkins, H., Arthur, R. & Chen, Q. Natural ventilation in buildings: Measurement in a wind tunnel and numerical simulation with large-eddy simulation. J. Wind Eng. Ind. Aerodyn. (2003). doi:10.1016/S0167-6105(02)00380-X.
    5 years ago by @ijiris
    (0)
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I): 20-28 (January 2019)1. Khidir, M. and Ali, A. (2011).A Comparative Study of Authentication Methods for Wi-Fi Networks. In: Proceedings of International Conference on Computational Intelligence, Communication Systems and Networks Online, pp. 190-194. 2. Sheila, F., Bernard, E., Les, O., Karen, S.(2007). Establishing Wireless Robust security Networks: A Guide to IEEE 802.11i, NIST.US. 3. Kwang-Hyun, B., Sean, W. and David, K. (2004). A Survey of WPA and 802.11i RSN Authentication Protocols. Dartmouth College: Computer Science Technial Report TR2004-524. Available at: www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf 4. Borisov,N. , Goldberg,I. and Wagner, D.(2001). Intercepting Mobile Communications: The Insecurity of 802.11. In: Proceedings of 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy: ACM Press. 5. Yizhan, S. (2006). Complexity of System Configuration Management, PhD thesis, Tufts University..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I): 12-19 (January 2019)1. Timmons, D., Harris, J. M., Roach, B. (2014), The Economics of Renewable Energy, A GDAE Teaching Module on Social and Environmental Issues in Economics. Online. Available: http://www.ase.tufts.edu/gdae/education_materials/modules/RenewableEnergyEcon.pdf accessed February, 2018. 2. Rawat, D., Sauni, P. (2015, July-August), Importance and Prospects of Renewable Energy: Emerging Issues in India, International Journal of Art & Humanity Science (IJAHS), e-ISSN: 2349-5235, Volume 2, Issue 4, pp. 11-18. 3. Bhatt, R., Macwan, J.E.M., Bhatt, D., Patel, V. (2010), Analytic Hierarchy Process Approach for Criteria Ranking of Sustainable Building Assessment: A Case Study, World Applied Sciences Journal 8 (7), pp. 881-888, ISSN 1818-4952, Retrieved from https://pdfs.semanticscholar.org/bdee/4a4c30d0dd1aed3245021704d2871b50b516.pdf accessed Jan 10, 2018. 4. Raha, P., Sarkar, D. (2013), Energy Audit Report of Nabo Jibon - Howrah, conducted by Energy Management Department, Master of Public System Management, Indian Institute of Social Welfare & Business Management, Kolkata. 5. Thakurta, A. G., Ghosh, D., Umashankar, S. (2004), Project Report on Energy Audit of IISWBM Building, conducted by Energy Management Department, Master of Public System Management, IISWBM, Kolkata. 6. IISWBM (2015), Study of Energy Use and the Working of Solar P. V. Net Metering System at RKM Vivekananda Centenary College - Rahara, conducted by Energy Management Department, Master of Public System Management, Indian Institute of Social Welfare & Business Management, Kolkata. 7. Gupta, N. (2015), Sustainable Energy Studies at Sri Mayapur Dham, conducted by Energy Management Department, Master of Public System Management, Indian Institute of Social Welfare & Business Management, Kolkata. 8. Dutta, P. (2015), Assessment of the Potential of Biomass based Cogeneration at Sri Mayapurdham, conducted by Energy Management Department, Indian Institute of Social Welfare & Business Management, Kolkata. 9. Majumdar, S.B., Choudhury, B.K. (2017), Greening Buildings: Action based on Identification of Retrofitted Parameters, IJIRAE, Vol. 4, Issue 8, ISSN (Online): 2349-2163. 10. Majumdar, S.B., Choudhury, B.K. (2017), Application of Scientific Decision Supporting Tool to Optimize Energy Consumption in way of Greening the Existing Buildings, IJIRSET, Vol. 6, Issue 8, ISSN (Online): 2319-8753..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I): 01-14 (January 2019)1. Aleksander. I and Dunmall. B, Axioms and Tests for the Presence of Minimal Consciousness in Agents, 2. Antonio Casella and Giuseppe Giuliani, Scientific thought and commonsense, presented at the “Conference Science as Culture” Como-Pavia, 15-19 September1999. Available at:http://fisicavolta.unipv.it/percorsi/philosophy.asp , accessed on 08/08/2 3. Barry Smith, D.W. Smith, Commonsense, Cambridge University Press, P 394-437, 1995. 4. Gordon, A. and Hobbs, J. A Commonsense Theory of Mind-Body Interaction. AAAI Spring Symposium on Logical Formalizations of Commonsense Reasoning, Stanford University, March 21-23, 2011. 5. Hobbs, J. R. and Gordon, A. S, Toward a large scale formal theory of commonsense psychology for metacognition. In Proceedings of AAAI Spring Symposium on Metacognition in Computation, pages 49–54, Stanford, CA. ACM, 2005. 6. Hugo Liu and Push Singh, ConceptNet: a practical commonsense reasoning toolkit. BT Technology Journal, 22(4):211-226. Elaborates on ConceptNet, 2004. 7. John McCarthy, `Programs with Commonsense'', in Proceedings of the Teddington Conference on the Mechanization of Thought Processes, Her Majesty's Stationery Office, London1959, Reprinted in McCarthy, 1990. 8. Minsky M, The Emotion Machine: Commonsense Thinking, Artificial Intelligence, and the Future of the Human Mind. Simon & Schuster, New York, 2006. 9. Shylaja. K.R, Dr. M.V.Vijaykumar, Dr. E.V. Prasad & Darryl. N. Davis, “Cognitive Architecture for evolving conscious actions into commonsense actions on Agents” presented at WCECS-2013, San Francisco, California, USA, October 2013. 10. Shylaja. K.R, Dr. M.V.Vijaykumar, Dr. E.V. Prasad & Darryl. N. Davis, “Consciousness and Commonsense Critics in Cognitive Architecture: Case study of Society of Mind Cognitive Architecture”, accepted by IJALR for upcoming edition, 2012. 11. Singh P, EM-ONE: Architecture for Reflective Commonsense Thinking, PhD Thesis, 2005. Available at http://web.media.mit.edu/~pus. 12. Singh, Barbara Barry, and Hugo Liu, Teaching machines about everyday life. BT Technology Journal, 22(4):227-240. Reviews several commonsense reasoning systems we are building at the lab--ConceptNet, LifeNet, and StoryNet, 2004. 13. Singh, Marvin Minsky, and Ian Eslick , Computing commonsense, BT Technology Journal, 22(4):201-210, 2004. 14. Vijayakumar. M.V. and D.N. Davis, Soft Artificial Life, Artificial Agents and Artificial Economics, International Journal, 2009. 15. Vijayakumar. M.V. and D.N. Davis, Design of Micro-agents based on the Artificial Economics, International Conference on Artificial Intelligence (ICAI’09) USA, ,2009. 16. M. A. Montes de Oca, T. Stutzle, M. Birattari, M. Dorigo, "Frankenstein's PSO: A composite particle swarm optimization algorithm," IEEE Transactions on Evolutionary Computation, vol. 13, no. 5, pp. 1120-1132, Oct. 2009. 17. C. Weineng, Z. Jun, C. Henry S.H., Z. Wenliang, W. Weigang, S. Yuhui, Ä novel set-based particle swarmoptimization method for discrete optimization problems," IEEE Transactions on Evolutionary Computation, vol. 14, no. 2, pp. 278-300, Apr. 2010. 18. M. R. AIRashidi, M. E. El-Hawary, Ä survey of particle swarm optimization applications in electric power systems," IEEE Transactions on Evolutionary Computation, vol. 13, no. 4, pp. 913-918, Aug. 2009. 19. Beni.G, Wang.J, Swarm Intelligence in cellular robotic systems, precede NATO advanced workshop on robots & biological systems, Italy June 26-30 in 1989. 20. Winkielman&Schooler, 2011, Splitting consciousness: Unconscious, conscious, and metaconscious processes in social cognition, EUROPEAN REVIEW OF SOCIAL PSYCHOLOGY 2011, 22, 1–35 21. Singer, W., 2000, Phenomenal conscious ness and consciousness from a neurobiological perspective, In T. Metzinger (Ed.), Neural correlatesof consciousness: Empirical and Conceptual questions (pp. 121–138). Cambridge, MA: MIT Press. 22. Searle, J., 1997, The mystery of consciousness, New York: New York Review Press. 23. Robin, Schmidt, Shamantics, 2007, Conscious Studies, online book, available at http://en.wikibooks.org/wiki/consciousness_studied.pdf 24. M.V Vijayakumar, 2008, Society of Mind Approach to Cognition and Metacognition in a Cognitive Architecture, PhD Thesis (University of Hull, UK, 2008). 25. K.R.Shylaja, M V Vijayakumar, E V Prasad and Darryl. N Davis, 2012, Consciousness and Common Sense critics in Cognitive Architectures: Case Study of Society of Mind Cognitive Architecture, IJALR 2012. 26. Jacoby, L. L., Yonelinas, A. P., & Jennings, J. M., 1997, The relation between conscious and unconscious (automatic) influences: A declaration of independence. In J. C. Cohen & J. W. Schooler (Eds.), Scientific approaches to consciousness (pp. 13–48). Mahwah, NJ: Erlbaum..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue IX): 492-496 (November 2018)1. Qaddumi, J., & Khawaldeh, A. Pressure ulcer prevention knowledge among Jordanian nurses: a cross-sectional study. BMC Nursing, 13(1). Nov. 2014 2. Calderon, M., Hurtado, L., Eugenio, A., Agustin, M., Cartaquis, M., Diaz, P., … Bautista, Q. (2017). The knowledge of nurses in pressure ulcer prevention and their attitude towards the use of the Braden scale. Retrieved from www.nursingrepository.org 3. Al Shidi, A. Thesis on Pressure management in Oman: Nurses’ knowledge and views. University of Glasgow. Sep. 2016 4. Uba, N., Alih, I., Kever, T., & Lola, N. Knowledge attitude and practice of nurses toward pressure ulcer prevention in University of Maiduguri Teaching Hospital, Borno State, North-Eastern Nigeria. International Journal of Nursing and Midwifery, 7(14), 54–60. July. 2015 5. Mwebaza, I., Katende, G., Groves, S., & Nankumbi, J. Nurses’ Knowledge, Practices, and Barriers in Care of Patients with Pressure Ulcers in a Ugandan Teaching Hospital. Journal of Nursing Research and Practice. Dec. 2014 6. Shrestha, R.. Knowledge and practices of bed sore prevention among staff nurses working in a selected hospital, Ludhiana, Punjab, India. Journal of Chitwan Medical College, 6(18), 18–23. Dec. 2016 7. Muna, S., Rula, F., Rawan, M., & Mohammad, S. Exploring Nurses’ Knowledge and Perceived Barriers to Carry Out Pressure Ulcer Prevention and Treatment, Documentation, and Risk Assessment. American International Journal of Contemporary Research, 4(4), 112–119. May. 2014 8. Al-Ghamdi, A. Factors Affecting Nurses’ Compliance in Preventing Pressure Ulcer Among Hospitalized Patients at King Abdulaziz University Hospital. American Journal of Nursing Science, 6(5), 387–395. May. 2017. 9. Dilie, A., & Mengistu, D. Assessment of Nurses’ Knowledge, Attitude, and Perceived Barriers to Expressed Pressure Ulcer Prevention Practice in Addis Ababa Government Hospitals, Addis Ababa, Ethiopia. Hindawi Publishing Corporation, Sep. 2015. 10. Bayoumi, M., & Bassuni, E. Saudi Nurses’ Level of Knowledge Regarding to Pressure Ulcer Preventive Measures. International Journal of Prevention and Treatment, 5(1), 7–11.Sep.2016 11. Nuru, N., Zewdu, F., Amsalu, S., & Mehretie, Y. Knowledge and practice of nurses towards prevention of pressure ulcer and associated factors in Gondar University Hospital, Northwest Ethiopia. BMC Nursing, 14(34), Sep. 2015. 12. Getanda, A., Chirchir, V., Omune, F., Tanui, C., Kosgey, A., & Ayumba, R. Awareness of Risk Assessment and Prevention of Pressure Ulcers amongst Nurses Working in Surgical and Orthopedic Wards of a Kenyan National Hospital. Kenya Journal of Nursing and Midwifery, 1(1), 1–10. July. 2016 13. McDonald, M. Systemic assessment of learning outcome: Developing multiple choice examinations (1st Edition). Sudbury MA: Jones & Bartiett Publishers.2002.
    6 years ago by @ijiris
    (1)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue VIII): 486-491 (October 2018)1. Hinkle, J., & Cheever, K. Textbook of Medical Surgical Nursing (13th Edition). Lippincott Williams and Wilkins, 2014. 2. NPUAP, EPUAP, & PPPIA. Prevention and Treatment of Pressure Ulcers: Quick Reference Guide. 2014. 3. Durkin, D., & May, R. (2015). Stop the pressure. Available at http: //nhs.stopthepressure.co.uk/whats-happening.html. 4. Shrestha, R.. Knowledge and practices of bed sore prevention among staff nurses working in a selected hospital, Ludhiana, Punjab, India. Journal of Chitwan Medical College, 6(18), 18–23, Nov. 2016. 5. Chou, R., Dana, T., Bougatsos, C., Blazina, I., Starmer, A., Reitel, K., & Buckley, D. (2013). Pressure Ulcer Risk Assessment and Prevention: Comparative Effectiveness Review. Agency for Healthcare Research and Quality. Available at www.ahrq.gov 6. Nuru, N., Zewdu, F., Amsalu, S., & Mehretie, Y. Knowledge and practice of nurses towards prevention of pressure ulcer and associated factors in Gondar University Hospital, Northwest Ethiopia. BMC Nursing, 14(34), Sep. 2015. 7. Onigbinde, A., Ogunsanya, I., & Oniyangi, S. Pressure ulcer incidence among high-risk inpatients in Nigeria. British Journal of Nursing, 20(12), 4–11, June. 2012. 8. Nangole, F. Pressure ulcers presentations and management at Kenyatta National Hospital and Spinal Injury Hospital. East African Medical Journal, 5(12), 23-29, Dec. 2010. 9. Loikkanen, R., & Tamni, M. Pressure ulcer prevention and its implementation in practice-a literature review. Helsinki Metropolia University of Applied Sciences. Dec. 2016 10. NCK.) Manual of Clinical Procedures (3rd Edition). Nairobi: Nursing Council of Kenya. 2009. 11. MOH IP Register. Inpatient Register MOH 301. Republic of Kenya Ministry of Health. 2018. 12. Dilie, A., & Mengistu, D. Assessment of Nurses’ Knowledge, Attitude, and Perceived Barriers to Expressed Pressure Ulcer Prevention Practice in Addis Ababa Government Hospitals, Addis Ababa, Ethiopia. Hindawi Publishing Corporation, Sep. 2015. 13. Al-Ghamdi, A. Factors Affecting Nurses’ Compliance in Preventing Pressure Ulcer Among Hospitalized Patients at King Abdulaziz University Hospital. American Journal of Nursing Science, 6(5), 387–395. May. 2017. 14. Al Shidi, A. Thesis on Pressure management in Oman: Nurses’ knowledge and views. University of Glasgow. Sep. 2016 15. Getanda, A., Chirchir, V., Omune, F., Tanui, C., Kosgey, A., & Ayumba, R. Awareness of Risk Assessment and Prevention of Pressure Ulcers amongst Nurses Working in Surgical and Orthopedic Wards of a Kenyan National Hospital. Kenya Journal of Nursing and Midwifery, 1(1), 1–10. July. 2016 16. Mwebaza, I., Katende, G., Groves, S., & Nankumbi, J. Nurses’ Knowledge, Practices, and Barriers in Care of Patients with Pressure Ulcers in a Ugandan Teaching Hospital. Journal of Nursing Research and Practice. Dec. 2014.
    6 years ago by @ijiris
    (1)
     
     
  •  

    , , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue VIII): 475-485 (October 2018)1. Chalom, Edmond, Eran Asa, and Elior Biton. "Measuring image similarity: an overview of some useful applications." IEEE Instrumentation & Measurement Magazine 16.1 (2013): 24-28. 2. Chandler, Damon M. "Seven challenges in image quality assessment: past, present, and future research." ISRN Signal Processing 2013 (2013). 3. Chandler, Damon M., Md Mushfiqul Alam, and Thien D. Phan. "Seven challenges for image quality research." Human Vision and Electronic Imaging XIX. Vol. 9014. International Society for Optics and Photonics, 2014. 4. Lajevardi, Seyed Mehdi, and Zahir M. Hussain. "Zernike moments for facial expression recognition." rn 2 (2009): 3. 5. Lajevardi, Seyed Mehdi, and Zahir M. Hussain. "Higher order orthogonal moments for invariant facial expression recognition." Digital Signal Processing 20.6 (2010): 1771-1779. 6. Pass, Greg, and Ramin Zabih. "Comparing images using joint histograms." Multimedia systems 7.3 (1999): 234-240. 7. Shnain, Noor Abdalrazak, Zahir M. Hussain, and Song Feng Lu. Ä feature-based structural measure: An image similarity measure for face recognition." Applied Sciences 7.8 (2017): 786. 8. Wang, Zhou, et al. "Image quality assessment: from error visibility to structural similarity." IEEE transactions on image processing 13.4 (2004): 600-612. 9. Zhang, Lin, et al. "FSIM: a feature similarity index for image quality assessment." IEEE transactions on Image Processing20.8 (2011): 2378-2386. 10. Aljanabi, Mohammed Abdulameer, Zahir M. Hussain, and Song Feng Lu. Än entropy-histogram approach for image similarity and face recognition." Mathematical Problems in Engineering 2018 (2018). 11. Aljanabi, Mohammed Abdulameer, Noor Abdalrazak Shnain, and Song Feng Lu. Än image similarity measure based on joint histogram—Entropy for face recognition." Computer and Communications (ICCC), 2017 3rd IEEE International Conference on. IEEE, 2017. 12. Hwang, Sun-Kyoo, and Whoi-Yul Kim. Ä novel approach to the fast computation of Zernike moments." Pattern Recognition 39.11 (2006): 2065-2076. 13. Canny, John. Ä computational approach to edge detection." IEEE Transactions on pattern analysis and machine intelligence 6 (1986): 679-698. 14. Picard, C. F. "The use of information theory in the study of the diversity of biological populations." Proc. Fifth Berk. Symp. IV. 1979. 15. Ponomarenko, Nikolay, et al. "TID2008-a database for evaluation of full-reference visual quality assessment metrics." Advances of Modern Radioelectronics 10.4 (2009): 30-45. 16. Ninassi, A., P. Le Callet, and F. Autrusseau. "Subjective quality assessment-IVC database." online http://www. irccyn. ec-nantes. fr/ivcdb (2006). 17. “Laboratories, A.T. The Database of Faces,” http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html 18. “FEI Face Database,” http://fei.edu.br/∼cet/facedatabase.html.
    6 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue IX): 465-470 (September 2018)1. Hussein T. Mouftah Khaled A. Ali, "Wireless personal area networks architecture and protocols for multimedia applications," Ad Hoc Networks, vol. 9, pp. 675–686, 2011. 2. Prashant Pillai, Vince W.C. Chook, Stefano Chessa, Alberto Gotta,Y. Fun Hu Paolo Baronti, "Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards," Computer Communications, vol. 30, pp. 1655–1695, 2007. 3. ZigBee Alliance, ZigBee Specification, January.2008, ZigBee Document 053474r17. 4. Kamaran Javed , “ZigBee suitability for Wirelee Sensor Networks in Logistic Telemetry Applications”, School of information Science,Computer and Electrical Engineering, Jan 2006 5. Ricardo Augusto Rodrigues da Silva Severino, Ön the use of IEEE 802.15.4/ZigBee for Time-Sensitive Wireless Sensor Network Applications," Polytechnic Institute of Porto, 2008. 6. F. Cuomo et al., Cross-layer network formation for energy-efficient IEEE 802.15.4/ZigBee Wireless Sensor Networks, Ad Hoc Netw. (2011). 7. Standard for part 15.4: Wireless MAC and PHY specifications for low rate WPAN, IEEE Std 802.15.4, IEEE, New York, NY (Oct 2003). 8. Vijay Anand Sai Ponduru Archana Bharathidasan, "Sensor Networks: An Overview," Department of Computer Science, University of California, Davis, CA 95616,. 9. Nidhi Patel, Hiren Kathiriya , Arjav Bavarva , “Wireless Sensor Network using ZigBee “,Intenational Journal of Research in Engineering and Technology, Vol 2, Issue 6, Jun 2013 10. A. Geetha , “Intelligent Helmet for Coal Minors with voice over ZigBee and Environmental Monitoring” , Middle East Journal of Scentific Research , ISSN 1990-9233,IDOSI Publications 2014. 11. Action Nechibvute, Courage Mudzingw, “Wireless Sensor Networks for SCADA and Industrial Control Systems” , International Journal of Engineering and Technology , Vol 3 No. 12, Dec2013. 12. Hariprabha .V, Vasantharathna .S, “Monitoring and control of food storage depots using Wireless Sensor Network” , International Journal of Industrial Electronics and Electrical Engineering, ISSN 2437-6982,Vol 2 Issue 6 June 2014. 13. Dipali K Shende , Arun K Mane , Rahul K More , Nikel M Nawale , “ARM 7 based Wireless Data Transmission using ZigBee” , International Journal of Innovative research in Electrical, Electronics , Instrumentation and Control Engineering, Vol3 Issue 5, may 2015..
    6 years ago by @ijiris
    (1)
     
     
  •  

    , , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue VII): 453-464 (September 2018)1. Hassan, Asmhan F., Dong Cailin, and Zahir M. Hussain. Än information- theoretic image quality measure: Comparison with statistical similarity." (2014). 2. Hashim, A.N. and Z.M. Hussain. Novel imagedependent quality assessment measures. in J. Comput. 2014. Citeseer. 3. Wang, Z., et al., Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing, 2004. 13(4): p. 600-612. 4. Sampat, M.P., Z. Wang, S. Gupta, A.C. Bovik and M.K. Markey, 2009. Complex wavelet structural similarity: A new image similarity index. IEEE Trans. Image Proc., 18: 2385-2401. DOI:10.1109/TIP.2009.2025923 5. Dan, L., D.Y. Bi and Y. Wang, 2010. Image quality assessment based on DCT and structural similarity. Proceedings of the 6th International Conference on Wireless Communications Networking and Mobile Computing, Sept. 23-25, IEEE Xplore Press, Chengdu, pp: 1-4. DOI: 10.1109/WICOM.2010.5600663 6. Zhang, L., et al., FSIM: A feature similarity index for image quality assessment. IEEE transactions on Image Processing, 2011. 20(8): p. 2378-2386. 7. Zhao, W., et al., Face recognition: A literature survey. ACM computing surveys (CSUR), 2003. 35(4): p. 399-458. 8. Barrett, W.A. A survey of face recognition algorithms and testing results. in Signals, Systems & Computers, 1997. Conference Record of the Thirty-First Asilomar Conference on. 1997. IEEE. 9. Hu, Y. and Z. Wang. A similarity measure based on Hausdorff distance for human face recognition. in Pattern Recognition, 2006. ICPR 2006. 18th International Conference on. 2006. IEEE. 10. Hashim, A.N. and Z. Hussain, Local and semi-global feature-correlative techniques for face recognition. IJACSA, 2014. 11. Hassan, A.F., Z. Hussain, and D. Cai-lin, An Information-Theoretic Measure for Face Recognition: Comparison with Structural Similarity. IJARAI. 2014. 12. Shnain, N.A., Z.M. Hussain, and S.F. Lu, A Feature-Based Structural Measure: An Image Similarity Measure for Face Recognition. Applied Sciences, 2017. 7(8): p. 786. 13. Shnain, Noor Abdalrazak, Song Feng Lu, and Zahir M. Hussain. "HOS image similarity measure for human face recognition." Computer and Communications (ICCC), 2017 3rd IEEE International Conference on. IEEE, 2017. 14. Aljanabi, Mohammed Abdulameer, Noor Abdalrazak Shnain, and Song Feng Lu. Än image similarity measure based on joint histogram—Entropy for face recognition." Computer and Communications (ICCC), 2017 3rd IEEE International Conference on. IEEE, 2017. 15. Teh, C.-H. and R.T. Chin, On image analysis by the methods of moments. IEEE Transactions on pattern analysis and machine intelligence, 1988. 10(4): p. 496-513. 16. Lajevardi, S.M. and Z.M. Hussain, Higher order orthogonal moments for invariant facial expression recognition. Digital Signal Processing, 2010. 20(6): p. 1771-1779. 17. Farajzadeh, N., K. Faez, and G. Pan, Study on the performance of moments as invariant descriptors for practical face recognition systems. IET Computer Vision, 2010. 4(4): p. 272-285. 18. Ono, A., Face recognition with Zernike moments. Systems and Computers in Japan, 2003. 34(10): p. 26-35. 19. Singh, C., N. Mittal, and E. Walia, Face recognition using Zernike and complex Zernike moment features. Pattern Recognition and Image Analysis, 2011. 21(1): p. 71-81. 20. Shi, Z., G. Liu, and M. Du, Rotary face recognition based on pseudo Zernike moments. Emerging Comput. Inf. Technol. Educ. Adv. Intell. Soft Comput, 2012. 146: p. 641-646. 21. Wang, Z. and E.P. Simoncelli. Translation insensitive image similarity in complex wavelet domain. in Acoustics, Speech, and Signal Processing, 2005. Proceedings.(ICASSP'05). IEEE International Conference on. 2005. IEEE. 22. Hwang, S.-K. and W.-Y. Kim, A novel approach to the fast computation of Zernike moments. Pattern Recognition, 2006. 39(11): p. 2065-2076. 23. Canny, J., A computational approach to edge detection. IEEE Transactions on pattern analysis and machine intelligence, 1986(6): p. 679-698. 24. N. Ponomarenko, V. Lukin, A. Zelensky, K. Egiazarian, M. Carli, and F. Battisti, “TID2008—A database for evaluation of full-reference visual quality assessment metrics,” Adv. Modern Radioelectron., vol. 10, pp. 30–45, 2009. 25. AT&T Laboratories, The Database of Faces, Cambridge online, ©2002 accessed 10/09/2014. Available from: http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html 26. Tom Fawcett, Än introduction to ROC analysis," Pattern Recognition Letters, 2006. 27. Seedahmed S. Mahmoud, Zahir M. Hussain, and Peter O’Shea, “A Geometrical-Based Microcell Mobile Radio Channel Model,” Wireless Networks, Springer, vol. 12, no. 5, pp. 653-664, 2006. 28. Seedahmed S. Mahmoud, Zahir M. Hussain, and Peter O’Shea, “Geometrical Model for Mobile Radio Channel with Hyperbolically Distributed Scatterers,” IEEE International Conference on Communication Systems (ICCS 2002), Singapore, Nov. 2002. 29. Yuu-Seng Lau and Zahir M. Hussain, “A New Approach in Chaos Shift Keying for Secure Communication,” Proceedings of the IEEE International conference on Information Theory and Its Applications (ICITA’2005), Sydney, Australia, 4-7 Jul. 2005..
    6 years ago by @ijiris
    (1)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue VI): 36-42 (August 2018)1. Airasian, P. W. (1991). Classroom assessment. New York: McGraw-Hill. 2. Alausa, Y. A. (2004). Continuous assessment in our schools: advantages and problems. Namibia: Kolin Foundation Arandis. 3. Abejehu, S.B. (2016). The practice of continuous assessment in primary schools: The case of Chagni, Ethiopia. Journal of Education and Practice, 7(13). 4. Baker, E. L. (2010). What probably works in alternative assessment. (CRESST Report 772). Los Angeles, CA: University of California, National Center for Research on Evaluation, Standards, and Student Testing (CRESST). Reprinted from paper originally presented at the Annual Meeting of the American Educational Research Association, Chicago, IL, April, 1991. 5. Baker, E. L., & Stites, R. (1991). Trends in testing in the USA.Politics of Education Association yearbook. London: Taylor & Francis. 6. Bayo, C.O (2005). The basic of research methodology. Lagos: Kotleb Publishers. 7. Falayajo, W. (1986), Philosophy and theory of continuous assessment. Paper presented at a work shop for inspectors of Education in Odor State, Nigeria. 8. Fraenkel, J. R., &Wallen, N. E. (1993). How to design and evaluate research in education. New York: McGraw-Hill. 9. Frederickson, N. (1992). Curriculum-based assessment: broadening the base. In Cline, T. (ed.) The assessment of special educational needs: International perspectives (pp. 147-169). London: Routledge. 10. Gay. L. R. (1962). Educational Research. Islamabad: National Book Foundation. 11. Gipps, C. (1990). Assessment- A teacher’s guide to the teachers. London: Hodder and Stonhton. 12. Goldring E & Berends M. (2009). Leading with Data: Pathways to Improve Your School. Thousand Oaks, CA: Corwin 13. Iqbal M, Samiullah, and Aysha A (2017)Bulletin of Education and Research April 2017, Vol. 39, No. 1 pp. 91-100 14. Inyan-Abia, M.E. (2004). Social studis technologies, method and media. Port Harcourt: Doubl Diamond Publications. 15. Lewis, A. C. (1997). Changing assessment, changing curriculum. Education Digest. 12-17. Mariappan Jawaharlal on Twitter: www.twitter.com/jawa13 16. Nitko, A. J. (2004). Educational assessments of students. Englewood Cliffs, NJ: Prentice Hall. 17. Nxumalo, Z.F. (2007). The role of continuous assessment in primary school (M.Ed. Dissertation). Retrieved from http://uzspace.uzulu.ac.za/bitstream/handle/10530/531 18. Paris, S. G., Wasik, B. A., & Turner, J. C. (1991).The development of strategic readers. In R. Barr, M. L. Kamil, P. B. Mosenthal & P. D. Pearson (eds.), Handbook of Reading Research (vol. 2). New York: Longman, 609-640. 19. Prouty, J. D & George. E. S. (2003). Continuous assessment: A practical guide for teachers. American Institute for Research. 20. Prouty, J. D & George. E. S. (2003). Continuous assessment: A practical guide for teachers. American Institute for Research. 21. Watkins, A. (ed.) (2007). Assessment in inclusive settings: key issues for policy and practice. Odense, Denmark: European Agency for Development in Special Needs Education..
    6 years ago by @ijiris
    (0)
     
     
  •  

    , , , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue V): 25-35 (July 2018)1 J. Umamaheswari and G. Radhamani, “A fusion technique for medical image segmentation,”in Devices, Circuits and Systems (ICDCS), 2012 International Conference on, 653–657, IEEE (2012). 2 X.-L. Jiang, Q. Wang, B. He, et al., “Robust level set image segmentation algorithm using local correntropy-based fuzzy c-means clustering with spatial constraints,” Neurocomputing 207, 22–35 (2016). 3 M. Sato-Ilic, Innovations in fuzzy clustering: Theory and applications, vol. 205, Springer Science & Business Media (2006). 4 J. K. Udupa and S. Samarasekera, “Fuzzy connectedness and object definition: theory, algorithms, and applications in image segmentation,” Graphical models and image processing 58(3), 246–261 (1996). 5 W. Cai, S. Chen, and D. Zhang, “Fast and robust fuzzy c-means clustering algorithms incorporating local information for image segmentation,” Pattern recognition 40(3), 825–838 (2007). 6 F. Z. Benchara, M. Youssfi, O. Bouattane, et al., “A new scalable, distributed, fuzzy cmeans algorithm-based mobile agents scheme for hpc: Spmd application,” Computers 5(3), 14 (2016). 7 G. Ilango and R. Marudhachalam, “New hybrid filtering techniques for removal of Gaussian noise from medical images,” ARPN Journal of Engineering and Applied Sciences 6(2), 8–12 (2011). 8 M. Habib, A. Hussain, S. Rasheed, et al., “Adaptive fuzzy inference system based directional median filter for impulse noise removal,” AEU-International Journal of Electronics and Communications 70(5), 689–697 (2016). 9 A. Diaz-Sanchez, J. Lemus-Lopez, J. M. Rocha Perez, et al., “Ultra low-power analog median filters.,” Radioengineering 22(3) (2013). 10 A. Makandar and B. Halalli, “Image enhancement techniques using highpass and lowpass filters,” International Journal of Computer Applications 109(14) (2015). 11 X. Kang, M. C. Stamm, A. Peng, et al., “Robust median filtering forensics based on the autoregressive model of median filtered residual,” in Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012 Asia-Pacific, 1–9, IEEE (2012). 12 F. Khateb, T. Kulej, and M. Kumngern, “0.5-v dtmos median filter,” AEU-International Journal of Electronics and Communications 69(11), 1733–1736 (2015). 13 A. Norouzi, M. S. M. Rahim, A. Altameem, et al., “Medical image segmentation methods, algorithms, and applications,” IETE Technical Review 31(3), 199–213 (2014). 14 S. Osher and J. A. Sethian, “Fronts propagating with curvature-dependent speed: algorithms based on hamilton-jacobi formulations,” Journal of computational physics 79(1), 12–49 (1988). 15 C. Li, C.-Y. Kao, J. C. Gore, et al., “Minimization of region-scalable fitting energy for image segmentation,” IEEE transactions on image processing: a publication of the IEEE Signal Processing Society 17(10), 1940 (2008). 16 L. Wang and C. Pan, “Robust level set image segmentation via a local correntropy-based k-means clustering,” Pattern Recognition 47(5), 1917–1925 (2014). 17 L. Khelifi and M. Mignotte, “Efa-bmfm: A multi-criteria framework for the fusion of colour image segmentation,” Information Fusion 38, 104–121 (2017). 18 Y.-T. Chen, “A novel approach to segmentation and measurement of medical image using level set methods,” Magnetic resonance imaging 39, 175–193 (2017). 19 M. Sadaaki, I. Hidetomo, and H. Katsuhiro, “Algorithms for fuzzy clustering: methods in c-means clustering with applications,” German: Springer (2008). 20 S. Krinidis and V. Chatzis, “A robust fuzzy local information c-means clustering algorithm,” IEEE transactions on image processing 19(5), 1328–1337 (2010). 21 S. S. Kumar, R. S. Moni, and J. Rajeesh, “Automatic segmentation of liver tumour using a possibilistic alternative fuzzy c-means clustering,” International Journal of Computers and Applications 35(1), 6–12 (2013). 22 H. Shamsi and H. Seyedarabi, “A modified fuzzy c-means clustering with spatial information for image segmentation,” International Journal of Computer Theory and Engineering 4(5), 762 (2012). 23 X. Yang, S. Zhan, D. Xie, et al., “Hierarchical prostate MRI segmentation via level set clustering with shape prior,” Neurocomputing 257, 154–163 (2017). 24 Y.-F. Tsai, I.-J. Chiang, Y.-C. Lee, et al., “Automatic mri meningioma segmentation using estimation maximization,” in Engineering in Medicine and Biology Society, 2005. IEEEEMBS 2005. 27th Annual International Conference of the, 3074–3077, IEEE (2005). 25 V. Bhateja, K. Rastogi, A. Verma, et al., “A non-iterative adaptive median filter for image denoising,” in Signal Processing and Integrated Networks (SPIN), 2014 International Conference on, 113–118, IEEE (2014). 26 A. Kaur, R. Malhotra, and R. Kaur, “Performance evaluation of non-iterative adaptive median filter,” in Advance Computing Conference (IACC), 2015 IEEE International, 1117–1121, IEEE (2015). 27 T. Altameem, E. Zanaty, and A. Tolba, “A new fuzzy c-means method for magnetic resonance image brain segmentation,” Connection Science 27(4), 305–321 (2015). 28 Y. Ding and X. Fu, “Kernel-based fuzzy c-means clustering algorithm based on genetic algorithm,” Neurocomputing 188, 233–238 (2016). 29 M. Balafar, A. Ramli, S. Mashohor, et al., “Compare different spatial based fuzzy-c mean (fcm) extensions for mri image segmentation,” in Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on, 5, 609–611, IEEE (2010). 30 D. J. Hemanth, J. Anitha, and V. E. Balas, “Performance improved modified fuzzy c-means algorithm for image segmentation applications,” Informatica 26(4), 635–648 (2015). 31 C. Nath, J. Talukdar, and P. Talukdar, “Robust fuzzy c-mean algorithm for segmentation and analysis of cytological images,” International Journal 1(1) (2012). 32 S. Yazdani, R. Yusof, A. Karimian, et al., “Image segmentation methods and applications in mri brain images,” IETE Technical Review 32(6), 413–427 (2015). 33 R. Suganya and R. Shanthi, “Fuzzy c-means algorithm-a review,” International Journal of Scientific and Research Publications 2(11), 1 (2012). 34 T. Friedrich, T. K¨otzing, M. S. Krejca, et al., “The compact genetic algorithm is efficient under extreme gaussian noise,” IEEE Transactions on Evolutionary Computation 21(3), 477–490 (2017). 35 R. B. Ali, R. Ejbali, and M. Zaied, “Gpu-based segmentation of dental x-ray images using active contours without edges,” in Intelligent Systems Design and Applications (ISDA), 2015, 15th International Conference on, 505–510, IEEE (2015). 36 Y. Chen, H. D. Tagare, S. Thiruvenkadam, et al., “Using prior shapes in geometric active contours in a variational framework,” International Journal of Computer Vision 50(3), 315–328 (2002)..
    6 years ago by @ijiris
    (1)
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue IV): 21-24 (April 2018)1. Gary Stoneburner, Alice Goguen, and Alexis Feringa, "Risk Management Guide for Information Technology Systems", Recommendations of the National Institute of Standards and Technology, Special Publication 800-30, pp.1-5, July 2002 2. Richard Kissel, Kevin Stine, Matthew Scholl, Hart Rossman, Jim Fahlsing, Jessica Gulick, "Security Considerations in the System Development Life Cycle ",October 2008, pp. 2-3 3. Ugur Aksu, Hadi Dilek, ˙Islam Tatlı, Kemal Bicakci,˙Ibrahim Dirik,Umut Demirezen, Tayfun Aykır,Ä Quantitative CVSS- Based Cyber Security Risk Assessment Methodology For IT Systems", 23-26 Oct. 2017,IEEE 4. Daniel Tse, Zehan Xie, Zhaolin Song,Äwareness of information security and its implications to legal and ethical issues in our daily life",10-13 Dec. 2017,IEEE 5. Ayesha M. Talha, Ibrahim Kamel, Zaher Al Aghbari, "Enhancing Confidentiality and Privacy of Outsourced Spatial Data", 2015 IEE9E 2nd International Conference on Cyber Security and Cloud Computing, 2015 6. 074747474.5ark Stamp’s, “Information Security Principle and Practice”,Vol-4, Wiley Interscience, pp. 386, 405, 2006.
    6 years ago by @ijiris
    (0)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue II): 01-12 (February 2018)1. https://www.gdatasoftware.com/blog/2017/04/29666-malware-trends-2017 2. http://docs.apwg.org/reports/apwg_trends_report_q4_2016.pdf 3. Neutralizing Windows-Based Malicious Mobile Code, James A. Whittaker, Andres De Vivanco. http://www.zdnet.com/article/linux-botnet-attacks-increase-in-scale/ 4. Malicious Spam Emails Developments and Authorship attribution, Mamoun Alazab,Robert Layton ,Fourth Cybercrime and Trustworthy Computing Workshop,2013. 5. WatchGuard Technologies : http://www.reputationauthority.org/ 6. AHEAD: A New Architecture for Active Defense,Fabio De Gaspari,Sushil Jajodia, 7. A Practical Business Security Framework to Combat Malware Threat ,P.R.Lakshmi Eswari,N.Sarat Chandra Babu,World Congress on Internet Security,2012 http://voorloopnul.com/blog/a-python-netstat-in-less-than-100-lines-of-code/ 8. Cyber Resilience for Mission Assurance , Harriet Goldman, Rosalie McQuaid, Jeffrey Picciotto https://www.digitalocean.com/community/tutorials/iptables-essentials-common-firewall-rules-and-commands https://www.python.org/ 9. https://rickypc.github.io/robotframework-imaplibrary/doc/ImapLibrary.html 10. www.urlvoid.com 11. www.virustotal.com.
    6 years ago by @ijiris
    (1)
     
     
  •  

    , , , , and . IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XII): 01-07 (December 2017)1 Hugh A. Chipman, Edward I. George, and Robert E. McCulloch. “Bayesian CART Model Search.” Journal of the American Statistical Association, Vol. 93(443), pp 935–948, September 1998. 2 Sujata Garera, Niels Provos, Monica Chew, and Aviel D. Rubin. “A framework for detection and measurement of phishing attacks.” In Proceedings of the 2007 ACM workshop on Recurring malicious code - WORM ’07, page 1, 2007. 3 Abhishek Gattani, AnHai Doan, Digvijay S. Lamba, NikeshGarera, Mitul Tiwari, Xiaoyong Chai, Sanjib Das, Sri Subramaniam, AnandRajaraman, and VenkyHarinarayan. “Entity extraction, linking, classifica- tion, and tagging for social media.” Proceedings of the VLDB Endowment, Vol. 6(11), pp 1126–1137, August 2013. 4 David D. Lewis. Naive (Bayes) at forty: The independence assumption in information retrieval. pages 4–15. 1998. 5 Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker. “Learning to detect malicious URLs.” ACM Transactions on Intelligent Systems and Technology, Vol. 2(3), pp 1–24, April 2011. 6 FadiThabtah Maher Aburrous, M.A.Hossain, KeshavDahal. “Intelligent phishing detection system for e-banking using fuzzy data mining.” Expert Systems with Applications, Vol. 37(12), pp 7913–7921, Dec 2010. 7 AnkushMeshram and Christian Haas. “Anomaly Detection in Industrial. Networks using Machine Learning: A Roadmap.” In Machine Learning for Cyber Physical Systems, pages 65–72. Springer Berlin Heidelberg, Berlin, Heidelberg, 2017. 8 Xuequn Wang Nik Thompson,Tanya Jane McGill. “Security begins at home: Determinants of home computer and mobile device security behavior.” Computers & Security, Vol. 70, pp 376–391, Sep 2017. 9 Dan Steinberg and Phillip Colla. “CART: Classification and Regression Trees.” The Top Ten Algorithms in Data Mining, pp 179–201, 2009. 10 D. Teal. “Information security techniques including detection, interdiction and/or mitigation of memory injection attacks,” Google patents. Oct 2013. 11 Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, and Dawn Song. “Design and Evaluation of a Real-Time URL Spam Filtering Service.” In 2011 IEEE Symposium on Security and Privacy, pp 447–462. May 2011. 12 Sean Whalen, Nathaniel Boggs, and Salvatore J. Stolfo. “Model Aggregation for Distributed Content Anomaly Detection.” In Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop - AISec ’14, pp 61–71, New York, USA, 2014. ACM Press. 13 Ying Yang and Geoffrey I. Webb. “Discretization for Naive-Bayes learning: managing a discretization bias and variance.” Machine Learning, Vol. 74(1), pp 39–74, Jan 2009..
    7 years ago by @ijiris
    (1)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XI): 01-04 (November 2017)1. Y Manjula, K B Shivakumar. Enhanced Secure Image Steganography using Double Encryption Algorithms, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 2. Aarti Singh, Manisha Malhotra. Hybrid Two-Tier Framework for Improved Security in Cloud Environment, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 3. Vishwanath Mahalle, Aniket Shahade. Enhancing the data security in cloud by implementing Hybrid (RSA & AES) Encryption Algorithm, International journal of pure & applied research in engineering and technology, 2016. 4. Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan, Madihah Mohd Saudi. A proposed system concept on Enhancing the Encryption and Decryption Method for Cloud Computing, 17th UKSIM-SMSS International Conference on Modelling and Simulation, 2015. 5. K.Yang, J.Xiaohua. Security for Cloud storage systems, Springer Brief in Computer Science, 2014. 6. C.K Chan, L.M Cheng. Hiding data in images by simple LSB substitution, Pattern Recognition, vol.37, pp. 469-474, 2014. 7. M.S Sutaone,M.V Khandare. Image based Steganography using LSB insertion Technique, IET International Conference, 2008. 8. Prof. Vishwanath S. Mahalle. Implementing RSA encryption algorithm to enhance the data security of cloud in cloud computing, International journal of pure & applied research in engineering and technology, 2013, volume 1(8):220-227, ISSN-2319-507X IJPRET..
    7 years ago by @ijiris
    (0)
     
     
  •  

    . misc, (September 2017)1. WU Qing—gang. The Current Situation and the Countermeasures of China Cold Chain Logistics Development. China Business and Market, 2011. 2. Zhang Zixiang, Cui Yan. Study on Fresh Farm Product E-commerce Mode Based on SWOT Analysis. Logistics technology, 2016..
    7 years ago by @ijiris
    (1)
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, 4 (3): 01-10 (March 2017)
    7 years ago by @ijiris
    (0)
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, 2017 (2): 14-27 (February 2017)
    7 years ago by @ijiris
    (1)
     
     
  • ⟨⟨
  • ⟩⟩