Buscar
Mostrando ítems 1-10 de 55
Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2017-03)
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system ...
Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2017-03)
Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming ...
A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2017-03)
Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud ...
Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2017-03)
Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer ...
Analysis of Security Mechanisms Based on Clusters IoT Environments
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2017-03)
Internet of things is based on sensors, communication networks and intelligence that manages the entire process and the generated data. Sensors are the senses of systems, because of this, they can be used in large quantities. ...
Masticatory System Biomechanical Photoelastic Simulation fot the Comparision of the Conventional and Uni-Lock Systems in Mandibular Osteosynthesis
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2017-09)
The biomechanical consequences of the interaction between titanium trauma plates and screws and the fractured mandible are still a matter of investigation. The mathematical and biomechanical models that have been developed ...
Workforce Optimization for Bank Operation Centers: A Machine Learning Approach
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2017-12)
Online Banking Systems evolved and improved in recent years with the use of mobile and online technologies, performing money transfer transactions on these channels can be done without delay and human interaction, however ...
Anomaly based Intrusion Detection using Modified Fuzzy Clustering
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2017-12)
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security has become an increasingly vital field in computer science in response to the proliferation of private sensitive information. ...
Multi-agent Systems for Arabic Handwriting Recognition
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2017-12)
This paper aims to give a presentation of the PhD defended by Boulid Youssef on December 26th, 2016 at University Ibn Tofail, entitled “Arabic handwritten recognition in an offline mode”. The adopted approach is realized ...
Comparison of Feedforward Network and Radial Basis Function to Detect Leukemia
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2017-09)
Leukemia is a fast growing cancer also called as blood cancer. It normally originates near bone marrow. The need for automatic leukemia detection system rises ever since the existing working methods include labor-intensive ...