


default search action
International Journal of e-Collaboration, Volume 16
Volume 16, Number 1, 2020
- Shahin Fatima

, Shish Ahmad
:
Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing. 1-15 - Osamah Ibrahim Khalaf, Ghaida Muttashar Abdulsahib

, Hamed Daei Kasmaei
, Kingsley A. Ogudo:
A New Algorithm on Application of Blockchain Technology in Live Stream Video Transmissions and Telecommunications. 16-32 - Sonam Gupta

, Lipika Goel
, Abhay Kumar Agarwal
:
Technologies in Health Care Domain: A Systematic Review. 33-44 - Tejaswi Khanna

, Parma Nand, Vikram Bali
:
Permissioned Blockchain Model for End-to-End Trackability in Supply Chain Management. 45-58
Volume 16, Number 2, 2020
- Youngkeun Choi

:
A Study of the Antecedents of Game Engagement and the Moderating Effect of the Self-Identity of Collaboration. 1-11 - Dongbo Liu, Zhichao Liu:

An Adaptive Cloud Monitoring Framework Based on Sampling Frequency Adjusting. 12-26 - Salam Abdallah:

Social Interactions in Electronic Networks of Practice: A Model for Effective Knowledge Construction, Problem Solving, and Learning. 27-44 - Ayman E. Khedr, Amira M. Idrees, Essam Shaaban:

Automated Ham-Spam Lexicon Generation Based on Semantic Relations Extraction. 45-64 - Shadab Siddiqui

, Manuj Darbari, Diwakar Yagyasen
:
Enhancing the Capability of Load Management Techniques in Cloud Using H_FAC Algorithm Optimization. 65-81 - Badreya Nasser Al-Jenaibi, Alyzia A. Almansouri:

Smartphone Effects on Youth: Case of United Arab Emirates. 82-96
Volume 16, Number 3, 2020
- Hong He:

A Novel Data Consistence Model Based on Virtual Peers in Peer-to-Peer Systems. 1-16 - Peng Xiao:

A Virtual Resource Pricing Mechanism Based on Three-Side Gaming Model in Large-Scale Cloud Environments. 17-32 - Shadab Siddiqui

, Manuj Darbari, Diwakar Yagyasen
:
An QPSL Queuing Model for Load Balancing in Cloud Computing. 33-48 - Mohammed Benali

, Abdessamed Réda Ghomari
, Leila Zemmouchi-Ghomari
, Mohammed Lazar:
Crowdsourcing-Enabled Crisis Collaborative Decision Making. 49-72 - Yogesh Gupta, Ashish Saini

:
A New Hybrid Document Clustering for PRF-Based Automatic Query Expansion Approach for Effective IR. 73-95 - Collence Takaingenhamo Chisita

, Rexwhite Tega Enakrire
, Masimba Clyde Muziringa:
Status of Electronic Theses and Dissertations (ETDs) in Academic Libraries in Zimbabwe. 96-108
Volume 16, Number 4, 2020
- Benjula Anbu Malar Manickam Bernard, Prabhu Jayagopal:

Data Storage Security in the Cloud Environment Using the Honey Pot System. 1-14 - Jayalakshmi D.

, J. Dheeba:
Border Detection in Skin Lesion Images Using an Improved Clustering Algorithm. 15-29 - Naga Jyothi P.

, D. Rajya Lakshmi, K. V. S. N. Rama Rao:
Identifying Fraudulent Behaviors in Healthcare Claims Using Random Forest Classifier With SMOTEchnique. 30-47 - G. Kavitha, N. M. Elango:

An Approach to Feature Selection in Intrusion Detection Systems Using Machine Learning Algorithms. 48-58 - Grande Naga Jyothi, Anusha Gorantla

, Thirumalesu Kudithi
:
ASIC Implementation of Linear Equalizer Using Adaptive FIR Filter. 59-71 - Preethi Devan

, Neelu Khare:
EFS-LSTM (Ensemble-Based Feature Selection With LSTM) Classifier for Intrusion Detection System. 72-86

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














