


default search action
International Journal of e-Collaboration, Volume 16
Volume 16, Number 1, 2020
- Shahin Fatima, Shish Ahmad
:
Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing. 1-15 - Osamah Ibrahim Khalaf, Ghaida Muttashar Abdulsahib
, Hamed Daei Kasmaei
, Kingsley A. Ogudo:
A New Algorithm on Application of Blockchain Technology in Live Stream Video Transmissions and Telecommunications. 16-32 - Sonam Gupta
, Lipika Goel
, Abhay Kumar Agarwal
:
Technologies in Health Care Domain: A Systematic Review. 33-44 - Tejaswi Khanna
, Parma Nand, Vikram Bali
:
Permissioned Blockchain Model for End-to-End Trackability in Supply Chain Management. 45-58
Volume 16, Number 2, 2020
- Youngkeun Choi
:
A Study of the Antecedents of Game Engagement and the Moderating Effect of the Self-Identity of Collaboration. 1-11 - Dongbo Liu, Zhichao Liu:
An Adaptive Cloud Monitoring Framework Based on Sampling Frequency Adjusting. 12-26 - Salam Abdallah:
Social Interactions in Electronic Networks of Practice: A Model for Effective Knowledge Construction, Problem Solving, and Learning. 27-44 - Ayman E. Khedr, Amira M. Idrees, Essam Shaaban:
Automated Ham-Spam Lexicon Generation Based on Semantic Relations Extraction. 45-64 - Shadab Siddiqui
, Manuj Darbari, Diwakar Yagyasen
:
Enhancing the Capability of Load Management Techniques in Cloud Using H_FAC Algorithm Optimization. 65-81 - Badreya Nasser Al-Jenaibi, Alyzia A. Almansouri:
Smartphone Effects on Youth: Case of United Arab Emirates. 82-96
Volume 16, Number 3, 2020
- Hong He:
A Novel Data Consistence Model Based on Virtual Peers in Peer-to-Peer Systems. 1-16 - Peng Xiao:
A Virtual Resource Pricing Mechanism Based on Three-Side Gaming Model in Large-Scale Cloud Environments. 17-32 - Shadab Siddiqui
, Manuj Darbari, Diwakar Yagyasen
:
An QPSL Queuing Model for Load Balancing in Cloud Computing. 33-48 - Mohammed Benali, Abdessamed Réda Ghomari
, Leila Zemmouchi-Ghomari
, Mohammed Lazar:
Crowdsourcing-Enabled Crisis Collaborative Decision Making. 49-72 - Yogesh Gupta, Ashish Saini:
A New Hybrid Document Clustering for PRF-Based Automatic Query Expansion Approach for Effective IR. 73-95 - Collence Takaingenhamo Chisita
, Rexwhite Tega Enakrire
, Masimba Clyde Muziringa:
Status of Electronic Theses and Dissertations (ETDs) in Academic Libraries in Zimbabwe. 96-108
Volume 16, Number 4, 2020
- Benjula Anbu Malar Manickam Bernard, Prabhu Jayagopal:
Data Storage Security in the Cloud Environment Using the Honey Pot System. 1-14 - Jayalakshmi D., J. Dheeba:
Border Detection in Skin Lesion Images Using an Improved Clustering Algorithm. 15-29 - Naga Jyothi P., D. Rajya Lakshmi, K. V. S. N. Rama Rao:
Identifying Fraudulent Behaviors in Healthcare Claims Using Random Forest Classifier With SMOTEchnique. 30-47 - G. Kavitha, N. M. Elango:
An Approach to Feature Selection in Intrusion Detection Systems Using Machine Learning Algorithms. 48-58 - Grande Naga Jyothi, Anusha Gorantla, Thirumalesu Kudithi
:
ASIC Implementation of Linear Equalizer Using Adaptive FIR Filter. 59-71 - Preethi Devan
, Neelu Khare:
EFS-LSTM (Ensemble-Based Feature Selection With LSTM) Classifier for Intrusion Detection System. 72-86

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.