7 articles in this issue
 
-
Sajjad Haider,Muhammad Shafqat,Shabih Haider
The paper presents an application of Influence Nets (INs) in the field of financial informatics. Influence Nets have primarily been used in war games to model effects based operations but, as shown in this paper, they can prove to be equally useful in oth... see more
Mounir Zrigui,Rami Ayadi,Mourad Mars,Mohsen Maraoui
In this paper, we present a new algorithm based on the LDA (Latent Dirichlet Allocation) and the Support Vector Machine (SVM) used in the classification of Arabic texts.Current research usually adopts Vector Space Model to represent documents in Text Clas... see more
Peter Kvasnica,Igor Kvasnica
The aim of this article is to discuss the design of distributed mathematical models and suitable parallel architecture of computers. The paper summarises the author’s experience with mathematical modelling of decomposed information systems of a simulator.... see more
Jishan Mehedi,Mrinal Kanti Naskar
Mobile Ad-Hoc Networks (MANETs) present real-time embedded system that is being used in a wide variety of applications where traditional networking infrastructure is practically infeasible. The highly dynamic character of a Mobile Ad-Hoc Network (MANET) p... see more
Adebukola Onashoga,Adesina Sodiya,A. Afolorunso
Over the years, Password-based Authentication (PA) techniques have been the widely used security mechanism that serves as a first level defence against unauthorised access. However, it is paramount that existing PA techniques should be improved upon in or... see more
Nayem Rahman,Jessica Marz,Shameem Akhter
Metadata is essential for understanding information stored in data warehouses. It helps increase levels of adoption and usage of data warehouse data by knowledge workers and decision makers. A metadata model is important to the implementation of a data wa... see more