Chrome Extension
WeChat Mini Program
Use on ChatGLM

International Journal of Advanced Computer Science and Applications Journal

Papers
Due to innumerous advantages the Global software engineering is trending now a days in software development industry. Basic drivers for this trend are flexibility, faster development and expected cost saving. Software development has moved from traditional development to the glob...
Cited10Views5
10
5
Download
BibtexChatPaperRate
VANETs (Vehicular Ad-hoc Networks) offer diversity of appealing applications. A lot of applications offered by VANETs depend upon the propagation of messages from one vehicle to another vehicle in the network. Several algorithms for useful broadcasting of safety/ warning messages...
Cited5Views2
5
2
Download
BibtexChatPaperRate
This paper discuss on the dimensions that has been derived for the hearing-impaired mobile applications usability model. General usability model consist of general dimension for evaluating mobile application however requirements for the hearing-impaired are overlooked and often s...
Cited3Views5
3
5
Download
BibtexChatPaperRate
Open data is data that anyone can freely use, access and redistribute without financial, legal or even technical restrictions. Accordingly, all governmental and non-governmental organizations may publish data that they own open for various purposes on the Internet without any res...
Cited1Views2
1
2
BibtexChatPaperRate
Muhammad K. A. Kiram,Maryati Mohd Yusof
Information systems development (ISD) is prone to failure, which can be defined as a time-consuming and costly phenomenon that provides value that is not directly appealing to clients. While ISD can be enhanced using various tools, models, and frameworks, failures related to ISD ...
Cited1Views1
1
1
BibtexChatPaperRate
Desirable features of support vector regression (SVR) models have led to researchers extending them to survival problems. In current paper we evaluate and compare performance of different SVR models and the Cox model using simulated and real data sets with different characteristi...
Cited9Views9
9
9
BibtexChatPaperRate
Ahmad Kamran Malik, Malik Ahsan Ali,Abdul Mateen,Wajeeha Naeem, Muhammad Anwar Abbasi,Yousra Asim,Basit Raza, Majid Iqbal Khan
Collaborative environments need access control to data and resources to increase working cooperation efficiently yet effectively. Several approaches are proposed and multiple access control models are recommended in this domain. In this paper, four Role-Based Access Control (RBAC...
Cited3Views16
3
16
Download
BibtexChatPaperRate
Cornelia Gyorodi,Robert Gyorodi, Romulus-Radu Moldovan-Duse,George Pecherle
Hierarchical data are found in a variety of database applications, including content management categories, forums, business organization charts, and product categories. In this paper, we will examine two models deal with hierarchical data in relational databases namely, adjacenc...
Cited1Views5
1
5
Download
BibtexChatPaperRate
In this paper, we present an approach to estimate mobile sound source trajectory. An artificially created sound source signal is used in this work. The main aim of this paper is to estimate the mobile object trajectory via sound processing methods. The performance of generalized ...
Cited0Views12
0
12
Download
BibtexChatPaperRate
Babur Hayat Malik,Javaria Khalid, Hafsa Arif,Ayesha Sadiqa, Amara Tanveer, Asia Mumtaz, Zartashiya Afzal,Samreen Azhar, Muhammad Numan Ali
Software metrics are created and used by the distinctive programming associations intended for assessing, guaranteeing program excellence, activity, and software recovery. Software metrics have turned into a basic part of programming growth and are utilized in each period of the ...
Cited1Views3
1
3
Download
BibtexChatPaperRate
The preservation of the water quality in the distribution network requires maintaining permanently minimum residual chlorine at any point of the network. This is possible only if we plan chlore's injections in various points of the network for intermediate rechlorination, or when...
Cited0Views0
0
0
BibtexChatPaperRate
DoS attack tools have become increasingly sophisticated challenging the existing detection systems to continually improve their performances. In this paper we present a victimend DoS detection method based on Artificial Neural Networks (ANN). In the proposed method a Feed-forward...
Cited25Views6
25
6
Download
BibtexChatPaperRate
Software engineers working in Modern Code Review (MCR) are confronted with the issue of lack of competency in the identification of situational factors. MCR is a software engineering activity for the identification and fixation of defects before the delivery of the software produ...
Cited5Views0
5
0
Download
BibtexChatPaperRate
Eye detection is a pre-requisite stage for many applications such as face recognition, iris recognition, eye tracking, fatigue detection based on eye-blink count and eyedirected instruction control. As the location of the eyes is a dominant feature of the face it can be used as a...
Cited32Views2
32
2
BibtexChatPaperRate
The application of machine learning (ML) techniques to predict blocking bugs have emerged for the early detection of Blocking Bugs (BBs) in software components to mitigate the adverse effect of BBs on software release and project cost. This study presents a systematic literature ...
Cited0Views6
0
6
Download
BibtexChatPaperRate
Babur Hayat Malik, Talia Anwar,Sadaf Ilyas, Farheen Jafar, Munazza Iftikhar, Maryam Malik, Noreen Islam Deen
Delivering information through cloud computing become a modern computation. For this purpose, electronic device is required to access with an active web server. For delivering different resources, the cloud supplier provides computing power for the cloud users to organize their m...
Cited2Views1
2
1
BibtexChatPaperRate
Improving data association technique in dense clutter environment for multi-target tracking used in Markov chain Monte Carlo based particle filter (MCMC-PF) are discussed in this paper. A new method named Viterbi filtered gate Markov chain Monte Carlo VFG-MCMC is introduced to av...
Cited23Views2
23
2
BibtexChatPaperRate
Data integration is one of the important subfields in data management. It allows users to access the same data from multiple sources without redundancy and preserving its integrity. Data Integration Governance Framework (DIGF) is being developed to guide the implementation of dat...
Cited1Views0
1
0
Download
BibtexChatPaperRate
Ghizlane Laghmari, Sanae Khali Issa,M'Hamed Ait Kbir
Since the stimulation of both feelings of need and temptation have become excessive with the spread of internet advertising, the e-consumer have begun to feel increasingly lost and overwhelmed by offers in a purchasing cycle whose process is mostly unstructured, unguided, and una...
Cited0Views0
0
0
BibtexChatPaperRate